Sciweavers

43 search results - page 1 / 9
» Architectures for Intrusion Tolerant Database Systems
Sort
View
ACSAC
2002
IEEE
13 years 10 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ESORICS
2006
Springer
13 years 8 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
IEEEARES
2010
IEEE
13 years 11 months ago
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
—Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. Howev...
Alex Hai Wang, Su Yan, Peng Liu
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
13 years 11 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
IPCCC
2006
IEEE
13 years 11 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood