Research on Network Design for Intrusion Tolerance of BcN
![]() |
Park, Hyun-Do
(고려대학교 컴퓨터학과)
Kim, Soo (고려대학교 컴퓨터학과) Lee, Hee-Jo (고려대학교 컴퓨터학과) Im, Chae-Tae (한국정보보호진흥원 기술기획팀) Won, Yoo-Jae (한국정보보호진흥원 기술기획팀) |
1 | 이강신, 임채태, 이태진, 김형종, 이동훈, 'SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability,'Proc. IEEE PCM, 2004 |
2 | James Reynolds, James Just, Ed Lawson, Larry Clough, Ryan Maglich, ;The Design and Implementation of an Intrusion Tolerant System,; Proc. IEEE DSN, 2002 |
3 | Feiyi Wang, Fengmin Gong, Chandramouli Sargor, Katerina Goseva-Popstojanova, Kishor Trivedi, Frank Jou, ;SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,'Proc. IEEE SMC, 2001 |
4 | Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, 'SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments,' Proc. IEEE DSN, 2004 |
5 | EventHelix, 'Fault Handling and Fault Tolerance,' h t t p : // w ww. e v e n t h e l i x . c o m / Re a l t imeMa n t r a /FaultHandling/ |
6 | David Sames, Brian Matt, Brian Niebuhr, Gregg Tally, Brent Whitmore, David Bakken, 'Developing a Heterogeneous Intrusion Tolerant CORBA System,'Proc. IEEE DSN, 2002 |
7 | Tod Courtney, James Lyons, HariGovind V. Ramasamy, William H. Sanders, and Mouna Seri, Michael Atighetchi, Paul Rubel, Christopher Jones, Franklin Webber, Partha Pal, and Ronald Watro, 'Providing Intrusion Tolerance With ITUA,' Proc. IEEE DSN, 2002 |
8 | Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene Spafford, 'ADEPTS: Adaptive Intrusion Response using Attack Graphs in an E-Commerce Environment,' Proc. IEEE DSN, 2005 |
9 | Wikipedia, 'Fault Tolerant system,' http://en. wikipedia.org/wiki/ Fault_tolerant_system |
10 | A. Adelsbach, D. Alessandri, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, K. Kursawe, J. C. Laprie, B., Pitzmann, D. Powell, B. Randell, J. Riordan, R. Stroud, P. Verssimo, M. Waidner, I. Welch, A. Wespi, 'MAFTIA Conceptual Model and Architecture,' LAAS-CNRS Report No. 01426, 2001 |
![]() |