Intrusions on the vetronics architecture often target specific applications. Intruders exploit vulnerabilities in the architecture and try to halt services or make them behave abnormally. The traditional security approach relies on the fortress model. That is, like a fortress, a preventive wall is built to ensure that the system is not penetrated. Survivability addresses the issue of security on the vetronics architecture. This paper make recommendations for improvements on the recognition and recovery mechanism of the vetronics survivability strategies by introducing a mechanism for intrusion tolerance to the architecture. This mechanism focuses on addressing the symptoms caused by an attack rather than preventing or detecting, diagnosing,...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
Network enabled capabilities (NEC) and electronic architectures inmodern-daymilitary vehicles fundam...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Applications that are part of a mission-critical information system need to maintain a usable level ...
International audienceWe introduce the concept of Intrusion Resilience Systems (IRS) for modern vehi...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
There is a significant body of research on distributed computing architectures, methodologies and al...
The ever-increasing, novel and sophisticated cyber threats underscore the need for more robust and r...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. Tha...
An intrusion tolerant architecture to enhance the security of smart grid control centers. The propos...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
Network enabled capabilities (NEC) and electronic architectures inmodern-daymilitary vehicles fundam...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Applications that are part of a mission-critical information system need to maintain a usable level ...
International audienceWe introduce the concept of Intrusion Resilience Systems (IRS) for modern vehi...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
There is a significant body of research on distributed computing architectures, methodologies and al...
The ever-increasing, novel and sophisticated cyber threats underscore the need for more robust and r...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. Tha...
An intrusion tolerant architecture to enhance the security of smart grid control centers. The propos...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...