Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

An architecture for adaptive intrusion-tolerant applications: Experiences with Auto-adaptive and Reconfigurable Systems

Published: 01 September 2006 Publication History

Abstract

Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyber-attacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed applications are increasingly threatened by sophisticated attacks that attempt to corrupt system components and violate service integrity. While various approaches have been explored to deal with DoS attacks, corruption-inducing attacks remain largely unaddressed. We have developed a collection of mechanisms based on redundancy, Byzantine fault tolerance, and adaptive middleware that help distributed, object-based applications tolerate corruption-inducing attacks. In this paper, we present the ITUA architecture, which integrates these mechanisms in a framework for auto-adaptive intrusion-tolerant systems, and we describe our experience in using the technology to defend a critical application that is part of a larger avionics system as an example. We also motivate the adaptive responses that are key to intrusion tolerance, and explain the use of the ITUA architecture to support them in an architectural framework. Copyright © 2006 John Wiley & Sons, Ltd.

Cited By

View all
  • (2013)Moving target defense (MTD) in an adaptive execution environmentProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460045(1-4)Online publication date: 8-Jan-2013
  • (2011)Using diversity in cloud-based deployment environment to avoid intrusionsProceedings of the Third international conference on Software engineering for resilient systems10.5555/2045537.2045559(145-155)Online publication date: 29-Sep-2011
  • (2011)Advanced Adaptive Application (A3) EnvironmentProceedings of the Middleware 2011 Industry Track Workshop10.1145/2090181.2090186(1-8)Online publication date: 12-Dec-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Software—Practice & Experience
Software—Practice & Experience  Volume 36, Issue 11-12
September 2006
264 pages

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 September 2006

Author Tags

  1. Byzantine fault tolerance
  2. adaptive defense
  3. adaptive middleware
  4. intrusion tolerance
  5. redundancy
  6. survivability architecture

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Moving target defense (MTD) in an adaptive execution environmentProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460045(1-4)Online publication date: 8-Jan-2013
  • (2011)Using diversity in cloud-based deployment environment to avoid intrusionsProceedings of the Third international conference on Software engineering for resilient systems10.5555/2045537.2045559(145-155)Online publication date: 29-Sep-2011
  • (2011)Advanced Adaptive Application (A3) EnvironmentProceedings of the Middleware 2011 Industry Track Workshop10.1145/2090181.2090186(1-8)Online publication date: 12-Dec-2011

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media