Loading…

Adaptive cyberdefense for survival and intrusion tolerance

While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing prot...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet computing 2004-11, Vol.8 (6), p.25-33
Main Authors: Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C., Loyall, J.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3
cites cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3
container_end_page 33
container_issue 6
container_start_page 25
container_title IEEE internet computing
container_volume 8
creator Atighetchi, M.
Pal, P.
Webber, F.
Schantz, R.
Jones, C.
Loyall, J.
description While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.
doi_str_mv 10.1109/MIC.2004.54
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_17775342</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355919</ieee_id><sourcerecordid>28674911</sourcerecordid><originalsourceid>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</originalsourceid><addsrcrecordid>eNqF0U1LAzEQBuAgCtbqyaOXxYMeZGsm2WwSb6X4Uah40XNIsxPYst2tyW6h_96UCoIHPc0cHl6YeQm5BDoBoPr-dT6bMEqLiSiOyAh0ATkFDsdpp0rnUlE4JWcxriilSjEYkYdpZTd9vcXM7ZYYKvTYRsx8F7I4hG29tU1m2yqr2z4Mse7arO8aDLZ1eE5OvG0iXnzPMfl4enyfveSLt-f5bLrIHZdFn4sSykoKyyWDUmnQDriiFkSJnDomSu65A6ksY8xrBp5RL531sqyKpULkY3J7yN2E7nPA2Jt1HR02jW2xG6JRukzJVKokb_6UTJWy0AD_QpBSCl6wBK9_wVU3hDada0BLzqXQNKG7A3KhizGgN5tQr23YGaBm34tJvZh9L0YUSV8ddI2IP5ILkX7DvwDYPoY-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>197337590</pqid></control><display><type>article</type><title>Adaptive cyberdefense for survival and intrusion tolerance</title><source>IEEE Xplore (Online service)</source><creator>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</creator><creatorcontrib>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</creatorcontrib><description>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/MIC.2004.54</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Adaptive control ; Brittleness ; Computer crime ; Current measurement ; Distributed information systems ; Electrical resistance measurement ; faul-tolerance ; Homeland security ; Information systems ; Internet ; Intrusion ; Intrusion detection ; middleware ; Programmable control ; Protection ; Survivability ; Survival ; Tolerances ; Virtual private networks</subject><ispartof>IEEE internet computing, 2004-11, Vol.8 (6), p.25-33</ispartof><rights>Copyright IEEE Computer Society Nov 2004</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</citedby><cites>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1355919$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Atighetchi, M.</creatorcontrib><creatorcontrib>Pal, P.</creatorcontrib><creatorcontrib>Webber, F.</creatorcontrib><creatorcontrib>Schantz, R.</creatorcontrib><creatorcontrib>Jones, C.</creatorcontrib><creatorcontrib>Loyall, J.</creatorcontrib><title>Adaptive cyberdefense for survival and intrusion tolerance</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</description><subject>Adaptive control</subject><subject>Brittleness</subject><subject>Computer crime</subject><subject>Current measurement</subject><subject>Distributed information systems</subject><subject>Electrical resistance measurement</subject><subject>faul-tolerance</subject><subject>Homeland security</subject><subject>Information systems</subject><subject>Internet</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>middleware</subject><subject>Programmable control</subject><subject>Protection</subject><subject>Survivability</subject><subject>Survival</subject><subject>Tolerances</subject><subject>Virtual private networks</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNqF0U1LAzEQBuAgCtbqyaOXxYMeZGsm2WwSb6X4Uah40XNIsxPYst2tyW6h_96UCoIHPc0cHl6YeQm5BDoBoPr-dT6bMEqLiSiOyAh0ATkFDsdpp0rnUlE4JWcxriilSjEYkYdpZTd9vcXM7ZYYKvTYRsx8F7I4hG29tU1m2yqr2z4Mse7arO8aDLZ1eE5OvG0iXnzPMfl4enyfveSLt-f5bLrIHZdFn4sSykoKyyWDUmnQDriiFkSJnDomSu65A6ksY8xrBp5RL531sqyKpULkY3J7yN2E7nPA2Jt1HR02jW2xG6JRukzJVKokb_6UTJWy0AD_QpBSCl6wBK9_wVU3hDada0BLzqXQNKG7A3KhizGgN5tQr23YGaBm34tJvZh9L0YUSV8ddI2IP5ILkX7DvwDYPoY-</recordid><startdate>20041101</startdate><enddate>20041101</enddate><creator>Atighetchi, M.</creator><creator>Pal, P.</creator><creator>Webber, F.</creator><creator>Schantz, R.</creator><creator>Jones, C.</creator><creator>Loyall, J.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7U1</scope><scope>7U2</scope><scope>C1K</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20041101</creationdate><title>Adaptive cyberdefense for survival and intrusion tolerance</title><author>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Adaptive control</topic><topic>Brittleness</topic><topic>Computer crime</topic><topic>Current measurement</topic><topic>Distributed information systems</topic><topic>Electrical resistance measurement</topic><topic>faul-tolerance</topic><topic>Homeland security</topic><topic>Information systems</topic><topic>Internet</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>middleware</topic><topic>Programmable control</topic><topic>Protection</topic><topic>Survivability</topic><topic>Survival</topic><topic>Tolerances</topic><topic>Virtual private networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Atighetchi, M.</creatorcontrib><creatorcontrib>Pal, P.</creatorcontrib><creatorcontrib>Webber, F.</creatorcontrib><creatorcontrib>Schantz, R.</creatorcontrib><creatorcontrib>Jones, C.</creatorcontrib><creatorcontrib>Loyall, J.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>Risk Abstracts</collection><collection>Safety Science and Risk</collection><collection>Environmental Sciences and Pollution Management</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Atighetchi, M.</au><au>Pal, P.</au><au>Webber, F.</au><au>Schantz, R.</au><au>Jones, C.</au><au>Loyall, J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adaptive cyberdefense for survival and intrusion tolerance</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>2004-11-01</date><risdate>2004</risdate><volume>8</volume><issue>6</issue><spage>25</spage><epage>33</epage><pages>25-33</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MIC.2004.54</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1089-7801
ispartof IEEE internet computing, 2004-11, Vol.8 (6), p.25-33
issn 1089-7801
1941-0131
language eng
recordid cdi_proquest_miscellaneous_17775342
source IEEE Xplore (Online service)
subjects Adaptive control
Brittleness
Computer crime
Current measurement
Distributed information systems
Electrical resistance measurement
faul-tolerance
Homeland security
Information systems
Internet
Intrusion
Intrusion detection
middleware
Programmable control
Protection
Survivability
Survival
Tolerances
Virtual private networks
title Adaptive cyberdefense for survival and intrusion tolerance
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A19%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adaptive%20cyberdefense%20for%20survival%20and%20intrusion%20tolerance&rft.jtitle=IEEE%20internet%20computing&rft.au=Atighetchi,%20M.&rft.date=2004-11-01&rft.volume=8&rft.issue=6&rft.spage=25&rft.epage=33&rft.pages=25-33&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/MIC.2004.54&rft_dat=%3Cproquest_cross%3E28674911%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=197337590&rft_id=info:pmid/&rft_ieee_id=1355919&rfr_iscdi=true