AbstractIn this paper we consider an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode for intrusions, which is called SITAR (Scalable Intrusion Tolerant Architecture), and describe the dynamic transition behavior by a continuous-time semi-Markov chain (CTSMC). Based on the embedded Markov chain (EMC) approach, we derive the steady-state probability of the CTSMC, the steady-state system availability and the mean time to security failure (MTTSF). Especially, we show necessary and sufficient conditions to exist the optimal switching time from an automatic detection mode to a manual detection mode, which maximizes the steady-state system availability. Next, we develop an adaptive mode contro...
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we...
Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from p...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Since security is increasingly the principal concern in the conception and implementation of softwar...
Abstract. SITAR is an architecture that incorporates the fundamental ideas of fault tolerant computi...
Information security incidents frequency has been increasing dramatically, the aim of this study is ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Cyber-physical systems (CPS) applied to safety-critical or mission-critical domains require high dep...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
It is not economically or technically feasible to make complex computersystems that are completely s...
Because virtual computing platforms are dynamically changing, it is difficult to build high-quality ...
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we...
Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from p...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Since security is increasingly the principal concern in the conception and implementation of softwar...
Abstract. SITAR is an architecture that incorporates the fundamental ideas of fault tolerant computi...
Information security incidents frequency has been increasing dramatically, the aim of this study is ...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Cyber-physical systems (CPS) applied to safety-critical or mission-critical domains require high dep...
Quite often failures in network based services and server systems may not be accidental, but rather ...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
It is not economically or technically feasible to make complex computersystems that are completely s...
Because virtual computing platforms are dynamically changing, it is difficult to build high-quality ...
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we...
Abstract — This paper charts the course of adaptive behavior in intrusion tolerance, starting from p...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...