It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion tolerance system to update network security strategy, and derives an intrusion tolerance finite automaton model from an existing intrusion tolerance model. The proposed model was quantified by the Markov theory to compute the stable probability of each state. The calculated stable probabilities provide the theoretical guidance and basis for administrators to better safeguard network security. Verification results show that it is feasible, effective, and convenient to integrate the Markov mo...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Many institutions rely on open systems to provide services to the public via the Internet. Unanticip...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Since security is increasingly the principal concern in the conception and implementation of softwar...
AbstractIn this paper we consider an intrusion tolerant system with two detection modes; automatic d...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
It is not economically or technically feasible to make complex computersystems that are completely s...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Abstract. Security-oriented risk assessment tools are used to determine the impact of certain events...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Many institutions rely on open systems to provide services to the public via the Internet. Unanticip...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Since security is increasingly the principal concern in the conception and implementation of softwar...
AbstractIn this paper we consider an intrusion tolerant system with two detection modes; automatic d...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
It is not economically or technically feasible to make complex computersystems that are completely s...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
A suitable strategy for network intrusion tolerance—detecting intrusions and remedying them—depends ...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Abstract. Security-oriented risk assessment tools are used to determine the impact of certain events...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Emergent networks like mobile ad hoc networks, sensor networks, opportunistic networks, peer-to-peer...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
Many institutions rely on open systems to provide services to the public via the Internet. Unanticip...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...