Sciweavers

17 search results - page 1 / 4
» Modeling and Evaluating the Survivability of an Intrusion To...
Sort
View
ESORICS
2006
Springer
13 years 8 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
IEEEARES
2010
IEEE
13 years 11 months ago
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
—Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. Howev...
Alex Hai Wang, Su Yan, Peng Liu
SRDS
2007
IEEE
13 years 11 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
DSN
2005
IEEE
13 years 10 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
CN
2007
224views more  CN 2007»
13 years 4 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...