Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen the dependability properties they were meant to improve. We model intrusions as a probabilistic effect of adver-sarial efforts and analyze different strategies of attack and rejuvenation. We compare several configurations of intrusion-tolerant replication and proactive rejuve-nation, and varying mission times and expected times to node-intrusion. In doing so, we identify thresholds that distinguish between improvement and degradation of dependability, with a focus on security. We hi...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
The pervasive interconnection of systems all over the world has given computer services a significan...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
In a recent paper, we presented proactive resilience as a new approach to proactive recovery, based ...
Survivability of a distributed system is the system’s ability to function as expected despite advers...
Since security is increasingly the principal concern in the conception and implementation of softwar...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Over the past 20 years, there have been indisputable advances on the development of Byzantine Fault-...
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
While traditional secure database systems rely on prevention control and are very limited in survivi...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
The pervasive interconnection of systems all over the world has given computer services a significan...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
In a recent paper, we presented proactive resilience as a new approach to proactive recovery, based ...
Survivability of a distributed system is the system’s ability to function as expected despite advers...
Since security is increasingly the principal concern in the conception and implementation of softwar...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Over the past 20 years, there have been indisputable advances on the development of Byzantine Fault-...
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
While traditional secure database systems rely on prevention control and are very limited in survivi...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
The pervasive interconnection of systems all over the world has given computer services a significan...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...