Browse > Article

Resource Reallocation for the Protection of Essential Services  

민병준 (인천대학교 컴퓨터공학과)
김성기 (인천대학교 컴퓨터공학과)
최중섭 (한국정보보호진흥원)
김홍근 (한국정보보호진흥원)
Abstract
In order to guarantee system survivability against attacks based on new methodology, we need a solution to recognize important resources for essential services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the implementation of intrusion tolerant systems. By means of resource reallocation within a node, this scheme enables the essential services to survive even after the occurrence of a system attack. If the settlement does not work within the node, resource reallocation among nodes takes places, thus the essential services are transferred to another prepared server node. Experimental result obtained on a testbed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS(Intrusion Detection System) to produce effective responsive mechanism against attacks.
Keywords
Intrusion Tolerance; Dependability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Amjad Umar, et. al., 'Intrusion Tolerant Mid-dleware,' DARPA Information Survivability Conference & EXposition, 2001   DOI
2 Working Paper, 'The European Dependability Initiative,' Dec. 2000
3 DARPA의 Information survivability program(http://www.darpa.mil/ito)
4 V. Stavridou and B. Dutertre, 'From Security to Safety and Back,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998   DOI
5 V. Stavridou, 'Intrusion Tolerant Software Architectures,' DARPA Information Survivability Conference & EXposition, 200l   DOI
6 National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 'Securing the U.S Defence Information Infrastructures: A Proposed Approach,' 1998
7 Marc Wilikens, et. al., 'An Agenda for a Dependability Initiative,' Jan. 1998
8 Working Paper 'European Dependability Initiative: Inventory of EC Funded Projects in the area of Dependability,' Nov. 2000
9 John C. Knight, Matthew C. Elder, Xing Du, 'Error Recovery in Critical Infrastructure Systems,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998   DOI
10 C. Meadows, 'Security and Dependability: Then and Now,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998   DOI
11 Marc Wilikens, et. al., 'Defining the European Dependability Initiative,' May 1998
12 Brian Randell, 'Dependability - Unifying Concept,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998   DOI