A Study on the Intrustion Tolerance System Applied To the Security System

  • Shin Seung-jung ;
  • Kim Jung-tae ;
  • Ryu Dae-hyun ;
  • Na Jong-Whoa
  • Published : 2005.03.01

Abstract

The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

Keywords

Intrusion Tolerance;Oriented Security;Security

References

  1. Secrets & Solutions (Second Edition), McGraw-HilI, 2001 Schneider, B. Secrets and Lies: Digital Security in a Networked World. New York NY: John Wiley & Sons, August 2000
  2. Hevner, A. Linger, R., Sobel, A., and Walton, G. Specifying Large-Scale, Adaptive Systems with Flow-Service-Quality(FSQ) Objects, Proceedings of 10th OOPSLA Workshop on Behavioral Semantics, Tampa, October 2001
  3. Hayes, J., et al. 'Workflow Interoperability Standards for the Internet.' IEEE Internet Computing 4, 37-45. 3(May/June 2000) https://doi.org/10.1109/4236.845389
  4. Hartman, J. and Evans, W., Fault tolerant application enhanced network-Project A project under the DARPA Fault Tolerant Networks Program. Homepage Internet URL http://www.cs.arizona.edu/ftn, 2000
  5. Loyall, J. P., Pal, P. P., Schantz, R. E., and Webber. F., Building adaptive and agile applications using intrusion detection and response. In Proceedings of the ISOC Network and Distributed Systems Security Conference, Februrary 2000
  6. Linger, R., Pleszkoch, M., Walton, G., and Hevner, A Flow-Service-Quality Engineering: Foundations for Network System Analysis and Developement, Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2002-TN-019, July, 2002
  7. Loyall, J. P., Pal, P. P., Schantz, R. E. and Webber. F., Building adaptive and agile applications using intrusion detection and response. In Proceedings of the ISOC Network and distributed Systems Security Conference, Februrary 2000
  8. Li, B. and Lahrstedt. K., Qualprobes:middleware qos profiling services for configuring adaptive applications. In Proceedings of Middleware 2000 (LNCS 1795), Pages 256-272. Springer-Verlag, 2000
  9. Scambray, J., S. McClure, G. Kurtz, Hacking Exposed: Network Security
  10. Pal, P., Loyall, J., Zinky, J., Shapiro, R. and Megquier, J., Using qdl to specify qos aware distributed(quo) application configuration. In Proceedings of The 3rd IEEE International Symposium on Object-oriented Real-time distributed Computing (ISORC 00), March 2000
  11. Badger, L., Generic software wrappers. Internet URL http://www.pgp.com/research/nailabs/secureexecution/ wrappers-overview.asp. 2000
  12. Cardei, M., Cardei, I., Jha, R., and Pavan. A., Hierarchical feedback adaptation for real time sensor-based distributed applications. In Proceedings of Middleware 2000 (LNCS 1795), pages 415-435. Springer-Verlag, 2000