A Survey on Intrusion-Tolerant System

Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

[1]  Yaning Liu,et al.  Anomaly Detection in Medical Wireless Sensor Networks , 2013, J. Comput. Sci. Eng..

[2]  Hyunsoo Yoon,et al.  A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology , 2013, The Journal of Supercomputing.

[3]  김용기,et al.  효율적 자원 변환을 통한 고유의 침입감내 시스템 설계 , 2012 .

[4]  Hyunsoo Yoon,et al.  The design of adaptive intrusion tolerant system(ITS) based on historical data , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[5]  Kwang-Cheng Chen,et al.  Machine-to-Machine Communications for Healthcare , 2012, J. Comput. Sci. Eng..

[6]  김희영,et al.  A Design of a Novel Intrusion Tolerant System Using Virtual Machine Image Analysis and Secure Exposure Policy , 2012 .

[7]  Hyunsoo Yoon,et al.  A Novel Intrusion Tolerant System Based on Adaptive Recovery Scheme (ARS) , 2012, ICITCS.

[8]  Chanik Park,et al.  Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment , 2011, J. Comput. Sci. Eng..

[9]  Hala H. Zayed,et al.  Intrusion Detection: Supervised Machine Learning , 2011, J. Comput. Sci. Eng..

[10]  Greeshma Varghese,et al.  Analysis of intrusion-tolerant architectures for Web Servers , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[11]  서정연,et al.  Journal of Computing Science and Engineering(JCSE)의 국제화 작업 , 2010 .

[12]  Arun K. Sood,et al.  An Intrusion Tolerance Approach to Enhance Single Sign on Server Protection , 2010, 2010 Third International Conference on Dependability.

[13]  Arun K. Sood,et al.  Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[14]  Arun K. Sood,et al.  Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.

[15]  Vincent Nicomette,et al.  The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.

[16]  Arun K. Sood,et al.  Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[17]  Franklin Webber,et al.  The DPASA Survivable JBI — A High-Water Mark in Intrusion-Tolerant Systems , 2007 .

[18]  Paulo Veríssimo,et al.  Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.

[19]  Arun K. Sood,et al.  Incorruptible system self-cleansing for intrusion tolerance , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[20]  Y. Huang Self-Cleansing Systems for Intrusion Containment , 2006 .

[21]  Michael Atighetchi,et al.  Survivability architecture of a mission critical system: the DPASA example , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[22]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[23]  Karl N. Levitt,et al.  The design and implementation of an intrusion tolerant system , 2002, Proceedings International Conference on Dependable Systems and Networks.

[24]  Magnus Almgren,et al.  An Architecture for an Adaptive Intrusion-Tolerant Server , 2002, Security Protocols Workshop.

[25]  Michael Gertz,et al.  The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications , 2001 .

[26]  William H. Sanders,et al.  Intrusion Tolerance Approaches in ITUA , 2001 .