∗Signatures are on file in the Graduate School. iii The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these vulnerabilities. Before intrusion tolerance is accepted as an approach to security, there must be quantitative techniques to measure its survivability. However, there are very few attempts to do quantitative, model-based evaluation of the survivability of intrusion tolerant systems, especially in database field. In this thesis, I focus on modeling the survivability of an intrusion tolerant database system in the presence of attacks. Before studying the survivability of intrusion tolerant systems, we ne...
Large scale distributed systems typically have interactions among different services that create an ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Large scale distributed systems typically have interactions among different services that create an ...
While traditional secure database systems rely on prevention control and are very limited in survivi...
Abstract: The immaturity of current intrusion detection techniques limits traditional security mecha...
Quite often failures in network based services and server systems may not be accidental, but rather ...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection and response research has so far mostly concentrated on known and well-defined a...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Current database survivability technologies focus on maintaining data integrity and availability in...
Abstract—In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
The explosive growth of the Internet and network connections has led to increased opportunities for ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Large scale distributed systems typically have interactions among different services that create an ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Large scale distributed systems typically have interactions among different services that create an ...
While traditional secure database systems rely on prevention control and are very limited in survivi...
Abstract: The immaturity of current intrusion detection techniques limits traditional security mecha...
Quite often failures in network based services and server systems may not be accidental, but rather ...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection and response research has so far mostly concentrated on known and well-defined a...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Current database survivability technologies focus on maintaining data integrity and availability in...
Abstract—In recent years we have experienced a wave of DDoS attacks threatening the welfare of the i...
The explosive growth of the Internet and network connections has led to increased opportunities for ...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Large scale distributed systems typically have interactions among different services that create an ...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Large scale distributed systems typically have interactions among different services that create an ...