Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and user-controlled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusion-tolerance is to provide mission continuity even under conditions of sustained cyber attacks. We describe key themes of our previous work in adaptive cyber defense and introduction of autonomic response capabilities and discuss quantifiable progress as well as challenges that warrant further research. We also discuss the potential impact of new trends in distributed systems, e.g., service-oriented architecture and cloud computing, on future survivable systems, and point out new opportunities for deve...
Exploiting autonomic adaptation in defending a dis-tributed application is a relatively new research...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
In an adaptive security-critical system, security mechanisms change according to the type of threat ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
Cyber resilience is the most important feature of any cyber system, especially during the transition...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. Tha...
Large scale distributed systems typically have interactions among different services that create an ...
Abstract—Emerging software technologies such as SOA, cloud computing and semantic web are challengin...
Applications that are part of a mission-critical information system need to maintain a usable level ...
Large scale distributed systems typically have interactions among different services that create an ...
Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging t...
There is a significant body of research on distributed computing architectures, methodologies and al...
Exploiting autonomic adaptation in defending a dis-tributed application is a relatively new research...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
In an adaptive security-critical system, security mechanisms change according to the type of threat ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
Cyber resilience is the most important feature of any cyber system, especially during the transition...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. Tha...
Large scale distributed systems typically have interactions among different services that create an ...
Abstract—Emerging software technologies such as SOA, cloud computing and semantic web are challengin...
Applications that are part of a mission-critical information system need to maintain a usable level ...
Large scale distributed systems typically have interactions among different services that create an ...
Despite the increasing evolution of the cyber environment, enterprises seem to find it challenging t...
There is a significant body of research on distributed computing architectures, methodologies and al...
Exploiting autonomic adaptation in defending a dis-tributed application is a relatively new research...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
In an adaptive security-critical system, security mechanisms change according to the type of threat ...