Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.3.295

Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement  

Kim, Gi-Han (ETRI 부설 국가보안기술연구소)
Chio, Myeong-Ryeoi (ETRI 부설 국가보안기술연구소)
Lee, Kyung-Whan (중앙대학교 컴퓨터공학과)
Abstract
Currently security researchers focus on protection of program and data from malicious users and accidents. Therefore, many firewalls and intrusion detection systems have been developed commercially. The intrusion tolerance is a new concept that is the last line of defense for the information survivability. It emphasizes availability and integrity to provide critical system services continuously even when system is compromised. In this paper, we classify current intrusion tolerant technologies from the point of view of program and data. Furthermore, we propose an integrated framework that supports intrusion tolerance of program and data.
Keywords
Intrusion Tolerant System; Information Assurance; Information Survivability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 DARPA OASIS project home page, http://www.darpa.mil/ipto/research/oasis/
2 박상서, 정보전 대응체계 구축 현황, WISC2000 튜토리얼 자료집, 2000
3 http://www.afrlsn.afrl.af.mil/LA&S_topics.htmll#ITS
4 http://www.darpa.mil/ipto/research/oasis/demval-goals.html
5 Gergory R. Ganger et. al., Survivable Storge Systems, Procceedings of DISCEX2001, 2001
6 Katerina Goseva-Popstojanova et. al., Characterizing Intrusion Tolerant Systems Using a State Transition Model, Proceedings of DISCEX2001, 2001   DOI
7 유찬수, 리눅스 클러스터링, 정보과학회지, 제18권 제2호, 2000   과학기술학회마을
8 Victoria Stavridou, et.al., Intrusion Tolerant Software Architectues, Proceedings of DISCEX2001, 2001
9 Feiyi Wang, et. al., SITAR : A Scalable Intrusion-Tolerant Architecture for Distrubuted Services, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001   DOI
10 Galen Hung, et. al., Detours : Binary Interception of Win32 Functions, Proceedings of the 3rd USENIX Windows NT Symposium, 1999
11 Shaun Clowes, BlackHat Briefings 2001 in Amsterdam, Holland, http://www.securereality.com.au/archives.html
12 Gene H. Kim, et. al., The Design and Implementation of Tripwire : A File System Integrity Checker, Proceedings of the 2nd ACM Conference on CCS'94, pp.18-29, 1994   DOI
13 Matthew Schimid, et. al., Preventing the Execution of Unauthorized Win32 Applications, Proceedings of DISCEK2001, 2001   DOI
14 Terrance Mitchem, et. al., Linux Kernel Loadable Wrapper, Proceedings DISCEX2000, 2000   DOI
15 Tim Hollebeek, et. al., Interception, Wrapping and Analysis Framework for Win32 Scripts, Proceedings of DISCEX2000, 2000   DOI
16 Kenneth P. Birman, et. al., Spinglass : Secure and Scalable Communication Tools for Mission-Critical Computing, Proceedings of DISCEX2001, 2001   DOI
17 Partha P. Pal, et. al., Defense-Enabling Using Advanced Middleware: An Example, Proceedings of MILCOM2001, 2001   DOI
18 Gary McGraw et. al., Securing Java, Wiley, pp.38-48, 1999
19 Marcelo Tallis, et.al., 'Document Integrity through Mediated Interfaces,' Proceedings of DISCEX2001, 2001
20 Peng Liu, et. al., Intrusion Tolerant Database Systems, Technical Report, Dept.of Info.Systems, Univ.of Maryland, Baltimore County, 2001
21 Amjad Umar, et. al., Intrusion Tolerant Middleware, Proceedings of DISCEX2001, 2001   DOI
22 Patrick McDaniel, et. al., Antigone : A Flexible Framework for Secure Group Communication, Proceedings of the 8th USENLX Security Symposium, pp.99-114, 1999