Browse > Article

A Study on the Intrustion Tolerance System Applied To the Security System  

Shin Seung-jung (Hansei University)
Kim Jung-tae (Hansei University)
Ryu Dae-hyun (Hansei University)
Na Jong-Whoa (Hansei University)
Abstract
The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.
Keywords
Intrusion Tolerance; Oriented Security; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Secrets & Solutions (Second Edition), McGraw-HilI, 2001 Schneider, B. Secrets and Lies: Digital Security in a Networked World. New York NY: John Wiley & Sons, August 2000
2 Hevner, A. Linger, R., Sobel, A., and Walton, G. Specifying Large-Scale, Adaptive Systems with Flow-Service-Quality(FSQ) Objects, Proceedings of 10th OOPSLA Workshop on Behavioral Semantics, Tampa, October 2001
3 Hayes, J., et al. 'Workflow Interoperability Standards for the Internet.' IEEE Internet Computing 4, 37-45. 3(May/June 2000)   DOI   ScienceOn
4 Hartman, J. and Evans, W., Fault tolerant application enhanced network-Project A project under the DARPA Fault Tolerant Networks Program. Homepage Internet URL http://www.cs.arizona.edu/ftn, 2000
5 Loyall, J. P., Pal, P. P., Schantz, R. E., and Webber. F., Building adaptive and agile applications using intrusion detection and response. In Proceedings of the ISOC Network and Distributed Systems Security Conference, Februrary 2000
6 Linger, R., Pleszkoch, M., Walton, G., and Hevner, A Flow-Service-Quality Engineering: Foundations for Network System Analysis and Developement, Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2002-TN-019, July, 2002
7 Pal, P., Loyall, J., Zinky, J., Shapiro, R. and Megquier, J., Using qdl to specify qos aware distributed(quo) application configuration. In Proceedings of The 3rd IEEE International Symposium on Object-oriented Real-time distributed Computing (ISORC 00), March 2000
8 Loyall, J. P., Pal, P. P., Schantz, R. E. and Webber. F., Building adaptive and agile applications using intrusion detection and response. In Proceedings of the ISOC Network and distributed Systems Security Conference, Februrary 2000
9 Li, B. and Lahrstedt. K., Qualprobes:middleware qos profiling services for configuring adaptive applications. In Proceedings of Middleware 2000 (LNCS 1795), Pages 256-272. Springer-Verlag, 2000
10 Scambray, J., S. McClure, G. Kurtz, Hacking Exposed: Network Security
11 Badger, L., Generic software wrappers. Internet URL http://www.pgp.com/research/nailabs/secureexecution/ wrappers-overview.asp. 2000
12 Cardei, M., Cardei, I., Jha, R., and Pavan. A., Hierarchical feedback adaptation for real time sensor-based distributed applications. In Proceedings of Middleware 2000 (LNCS 1795), pages 415-435. Springer-Verlag, 2000