Loading…
Adaptive cyberdefense for survival and intrusion tolerance
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing prot...
Saved in:
Published in: | IEEE internet computing 2004-11, Vol.8 (6), p.25-33 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3 |
---|---|
cites | cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3 |
container_end_page | 33 |
container_issue | 6 |
container_start_page | 25 |
container_title | IEEE internet computing |
container_volume | 8 |
creator | Atighetchi, M. Pal, P. Webber, F. Schantz, R. Jones, C. Loyall, J. |
description | While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense. |
doi_str_mv | 10.1109/MIC.2004.54 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_17775342</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1355919</ieee_id><sourcerecordid>28674911</sourcerecordid><originalsourceid>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</originalsourceid><addsrcrecordid>eNqF0U1LAzEQBuAgCtbqyaOXxYMeZGsm2WwSb6X4Uah40XNIsxPYst2tyW6h_96UCoIHPc0cHl6YeQm5BDoBoPr-dT6bMEqLiSiOyAh0ATkFDsdpp0rnUlE4JWcxriilSjEYkYdpZTd9vcXM7ZYYKvTYRsx8F7I4hG29tU1m2yqr2z4Mse7arO8aDLZ1eE5OvG0iXnzPMfl4enyfveSLt-f5bLrIHZdFn4sSykoKyyWDUmnQDriiFkSJnDomSu65A6ksY8xrBp5RL531sqyKpULkY3J7yN2E7nPA2Jt1HR02jW2xG6JRukzJVKokb_6UTJWy0AD_QpBSCl6wBK9_wVU3hDada0BLzqXQNKG7A3KhizGgN5tQr23YGaBm34tJvZh9L0YUSV8ddI2IP5ILkX7DvwDYPoY-</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>197337590</pqid></control><display><type>article</type><title>Adaptive cyberdefense for survival and intrusion tolerance</title><source>IEEE Xplore (Online service)</source><creator>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</creator><creatorcontrib>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</creatorcontrib><description>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/MIC.2004.54</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>Adaptive control ; Brittleness ; Computer crime ; Current measurement ; Distributed information systems ; Electrical resistance measurement ; faul-tolerance ; Homeland security ; Information systems ; Internet ; Intrusion ; Intrusion detection ; middleware ; Programmable control ; Protection ; Survivability ; Survival ; Tolerances ; Virtual private networks</subject><ispartof>IEEE internet computing, 2004-11, Vol.8 (6), p.25-33</ispartof><rights>Copyright IEEE Computer Society Nov 2004</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</citedby><cites>FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1355919$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Atighetchi, M.</creatorcontrib><creatorcontrib>Pal, P.</creatorcontrib><creatorcontrib>Webber, F.</creatorcontrib><creatorcontrib>Schantz, R.</creatorcontrib><creatorcontrib>Jones, C.</creatorcontrib><creatorcontrib>Loyall, J.</creatorcontrib><title>Adaptive cyberdefense for survival and intrusion tolerance</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</description><subject>Adaptive control</subject><subject>Brittleness</subject><subject>Computer crime</subject><subject>Current measurement</subject><subject>Distributed information systems</subject><subject>Electrical resistance measurement</subject><subject>faul-tolerance</subject><subject>Homeland security</subject><subject>Information systems</subject><subject>Internet</subject><subject>Intrusion</subject><subject>Intrusion detection</subject><subject>middleware</subject><subject>Programmable control</subject><subject>Protection</subject><subject>Survivability</subject><subject>Survival</subject><subject>Tolerances</subject><subject>Virtual private networks</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNqF0U1LAzEQBuAgCtbqyaOXxYMeZGsm2WwSb6X4Uah40XNIsxPYst2tyW6h_96UCoIHPc0cHl6YeQm5BDoBoPr-dT6bMEqLiSiOyAh0ATkFDsdpp0rnUlE4JWcxriilSjEYkYdpZTd9vcXM7ZYYKvTYRsx8F7I4hG29tU1m2yqr2z4Mse7arO8aDLZ1eE5OvG0iXnzPMfl4enyfveSLt-f5bLrIHZdFn4sSykoKyyWDUmnQDriiFkSJnDomSu65A6ksY8xrBp5RL531sqyKpULkY3J7yN2E7nPA2Jt1HR02jW2xG6JRukzJVKokb_6UTJWy0AD_QpBSCl6wBK9_wVU3hDada0BLzqXQNKG7A3KhizGgN5tQr23YGaBm34tJvZh9L0YUSV8ddI2IP5ILkX7DvwDYPoY-</recordid><startdate>20041101</startdate><enddate>20041101</enddate><creator>Atighetchi, M.</creator><creator>Pal, P.</creator><creator>Webber, F.</creator><creator>Schantz, R.</creator><creator>Jones, C.</creator><creator>Loyall, J.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7U1</scope><scope>7U2</scope><scope>C1K</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20041101</creationdate><title>Adaptive cyberdefense for survival and intrusion tolerance</title><author>Atighetchi, M. ; Pal, P. ; Webber, F. ; Schantz, R. ; Jones, C. ; Loyall, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Adaptive control</topic><topic>Brittleness</topic><topic>Computer crime</topic><topic>Current measurement</topic><topic>Distributed information systems</topic><topic>Electrical resistance measurement</topic><topic>faul-tolerance</topic><topic>Homeland security</topic><topic>Information systems</topic><topic>Internet</topic><topic>Intrusion</topic><topic>Intrusion detection</topic><topic>middleware</topic><topic>Programmable control</topic><topic>Protection</topic><topic>Survivability</topic><topic>Survival</topic><topic>Tolerances</topic><topic>Virtual private networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Atighetchi, M.</creatorcontrib><creatorcontrib>Pal, P.</creatorcontrib><creatorcontrib>Webber, F.</creatorcontrib><creatorcontrib>Schantz, R.</creatorcontrib><creatorcontrib>Jones, C.</creatorcontrib><creatorcontrib>Loyall, J.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest Engineering Collection</collection><collection>Computing Database</collection><collection>Engineering Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>Risk Abstracts</collection><collection>Safety Science and Risk</collection><collection>Environmental Sciences and Pollution Management</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Atighetchi, M.</au><au>Pal, P.</au><au>Webber, F.</au><au>Schantz, R.</au><au>Jones, C.</au><au>Loyall, J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adaptive cyberdefense for survival and intrusion tolerance</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>2004-11-01</date><risdate>2004</risdate><volume>8</volume><issue>6</issue><spage>25</spage><epage>33</epage><pages>25-33</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/MIC.2004.54</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1089-7801 |
ispartof | IEEE internet computing, 2004-11, Vol.8 (6), p.25-33 |
issn | 1089-7801 1941-0131 |
language | eng |
recordid | cdi_proquest_miscellaneous_17775342 |
source | IEEE Xplore (Online service) |
subjects | Adaptive control Brittleness Computer crime Current measurement Distributed information systems Electrical resistance measurement faul-tolerance Homeland security Information systems Internet Intrusion Intrusion detection middleware Programmable control Protection Survivability Survival Tolerances Virtual private networks |
title | Adaptive cyberdefense for survival and intrusion tolerance |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A19%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adaptive%20cyberdefense%20for%20survival%20and%20intrusion%20tolerance&rft.jtitle=IEEE%20internet%20computing&rft.au=Atighetchi,%20M.&rft.date=2004-11-01&rft.volume=8&rft.issue=6&rft.spage=25&rft.epage=33&rft.pages=25-33&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/MIC.2004.54&rft_dat=%3Cproquest_cross%3E28674911%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=197337590&rft_id=info:pmid/&rft_ieee_id=1355919&rfr_iscdi=true |