The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] intrusion tolerance(2hit)

1-2hit
  • Adaptation Policies for Web Server Intrusion-Tolerant System

    Eul Gyu IM  Hoh Peter IN  Dae-Sik CHOI  Yong Ho SONG  

     
    LETTER-Internet

      Vol:
    E88-B No:8
      Page(s):
    3462-3465

    The emergence of intelligent and sophisticated attack techniques makes web services more vulnerable than ever which are becoming an important business tool in e-commerce. Many techniques have been proposed to remove the security vulnerabilities, yet have limitations. This paper proposes an adaptive mechanism for a web-server intrusion-tolerant system (WITS) to prevent unknown patterns of attacks by adapting known attack patterns. SYN flooding attacks and their adaptive defense mechanisms are simulated as a case study to evaluate the performance of the proposed adaptation mechanism.

  • Formal Verification of an Intrusion-Tolerant Group Membership Protocol

    HariGovind V. RAMASAMY  Michel CUKIER  William H. SANDERS  

     
    PAPER-Verification and Dependability Analysis

      Vol:
    E86-D No:12
      Page(s):
    2612-2622

    The traditional approach for establishing the correctness of group communication protocols is through rigorous arguments. While this is a valid approach, the likelihood of subtle errors in the design and implementation of such complex distributed protocols is not negligible. The use of formal verification methods has been widely advocated to instill confidence in the correctness of protocols. In this paper, we describe how we used the SPIN model checker to formally verify a group membership protocol that is part of an intrusion-tolerant group communication system. We describe how we successfully tackled the state-space explosion problem by determining the right abstraction level for formally specifying the protocol. The verification exercise not only formally showed that the protocol satisfies its correctness claims, but also provided information that will help us make the protocol more efficient without violating correctness.