Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2022_32_4_a11, author = {Di Giandomenico, Felicita and Masetti, Giulio and Chiaradonna, Silvano}, title = {Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {701--719}, publisher = {mathdoc}, volume = {32}, number = {4}, year = {2022}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2022_32_4_a11/} }
TY - JOUR AU - Di Giandomenico, Felicita AU - Masetti, Giulio AU - Chiaradonna, Silvano TI - Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods JO - International Journal of Applied Mathematics and Computer Science PY - 2022 SP - 701 EP - 719 VL - 32 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2022_32_4_a11/ LA - en ID - IJAMCS_2022_32_4_a11 ER -
%0 Journal Article %A Di Giandomenico, Felicita %A Masetti, Giulio %A Chiaradonna, Silvano %T Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods %J International Journal of Applied Mathematics and Computer Science %D 2022 %P 701-719 %V 32 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2022_32_4_a11/ %G en %F IJAMCS_2022_32_4_a11
Di Giandomenico, Felicita; Masetti, Giulio; Chiaradonna, Silvano. Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods. International Journal of Applied Mathematics and Computer Science, Tome 32 (2022) no. 4, pp. 701-719. http://geodesic.mathdoc.fr/item/IJAMCS_2022_32_4_a11/
[1] [1] Alladi, T., Chamola, V. and Zeadally, S. (2020). Industrial control systems: Cyber attack trends and counter measures, Computer Communications 155: 1–8.
[2] [2] Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. and Wright, R.N. (2018). From keys to databases—Real-world applications of secure multi-party computation, The Computer Journal 61(12): 1749–1771.
[3] [3] Avizienis, A. (1985). The N-version approach to fault-tolerant software, IEEE Transactions on Software Engineering SE-11(12): 1491–1501.
[4] [4] Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1): 11–33.
[5] [5] Babay, A., Tantillo, T., Aron, T., Platania, M. and Amir, Y. (2018). Network-attack-resilient intrusion-tolerant SCADA for the power grid, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Luxemburg, Luxemburg, pp. 255–266.
[6] [6] Bondavalli, A., Di Giandomenico, F. and Xu, J. (1993). A cost-effective and flexible scheme for software fault tolerance, Computer Systems: Science 8(4): 234–244.
[7] [7] Di Giandomenico, F. and Masetti, G. (2021). Basic aspects in redundancy-based intrusion tolerance, 14th International Conference on Computational Intelligence in Security for Information Systems/12th International Conference on European Transnational Educational, Bilbao, Spain, pp. 192–202.
[8] [8] Di Giandomenico, F. and Strigini, L. (1990). Adjudicators for diverse-redundant components, Proceedings of the 9th Symposium on Reliable Distributed Systems, Huntsville, USA, pp. 114–123.
[9] [9] Distler, T. (2022). Byzantine fault-tolerant state-machine replication from a system’s perspective, ACM Computing Surveys 54(1): 1–38.
[10] [10] Dohi, T., Trivedi, K. S. and Avritzer, A. (2020). Handbook of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions, WSPC, Singapore.
[11] [11] Garcia, M., Bessani, A., Gashi, I., Neves, N. and Obelheiro, R. (2014). Analysis of operating system diversity for intrusion tolerance, Software—Practice Experience 44(6): 735–770.
[12] [12] Gashi, I., Povyakalo, A. and Strigini, L. (2016). Diversity, safety and security in embedded systems: Modelling adversary effort and supply chain risks, 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden, pp. 13–24.
[13] [13] Gorbenko, A., Romanovsky, A., Tarasyuk, O. and Biloborodov, O. (2020). From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Transactions on Reliability 69(1): 22–39.
[14] [14] Haphuriwat, N. and Bier, V.M. (2011). Trade-offs between target hardening and overarching protection, European Journal of Operational Research 213(1): 320–328.
[15] [15] Hardekopf, B., Kwiat, K. and Upadhyaya, S. (2001). Secure and fault-tolerant voting in distributed systems, IEEE Aerospace Conference Proceedings, Gothenburg, Sweden, pp. 1117–1126.
[16] [16] Khan, M. and Babay, A. (2021). Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN21), Taipei, Taiwan, pp. 14–25.
[17] [17] Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity 2(1): 1–20.
[18] [18] Laprie, J.-C., Arlat, J., Beounes, C. and Kanoun, K. (1990). Definition and analysis of hardware and software-fault-tolerant architectures, Computer 23(7): 39–51.
[19] [19] Littlewood, B. and Strigini, L. (2000). A discussion of practices for enhancing diversity in software designs, Technical Report DISPO LS DI TR-04 V1 1d, Centre for Software Reliability, City University, London, https://openaccess.city.ac.uk/id/eprint/275/.
[20] [20] Lyu, M.R. (1995). Software Fault Tolerance, John Wiley Sons Ltd, Hoboken.
[21] [21] Majdzik, P. (2022). A feasible schedule for parallel assembly tasks in flexible manufacturing systems, International Journal of Applied Mathematics and Computer Science 32(1): 51–63, DOI: 10.34768/amcs-2022-0005.
[22] [22] Mejdi, S., Messaoud, A. and Ben Abdennour, R. (2020). Fault tolerant multicontrollers for nonlinear systems: A real validation on a chemical process, International Journal of Applied Mathematics and Computer Science 30(1): 61–74, DOI: 10.34768/amcs-2020-0005.
[23] [23] Nascimento, A.S., Rubira, C.M.F., Burrows, R. and Castor, F. (2013). A systematic review of design diversity-based solutions for fault-tolerant SOAs, Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, EASE’13, Porto de Galinhas, Brazil, pp. 107–118.
[24] [24] Obelheiro, R., Bessani, A., Lung, L. and Correia, M. (2006). How practical are intrusion-tolerant distributed systems?, Technical Report DI-FCUL TR 06–15, Department of Informatics, University of Lisbon, Lisbon, https://repositorio.ul.pt/handle/10451/14093.
[25] [25] Puig, V., Sauter, D., Aubrun, C. and Schulte, H. (Eds) (2018). Advanced Diagnosis and Fault-Tolerant Control Methods (special section), International Journal of Applied Mathematics and Computer Science 28(2): 233–333.
[26] [26] Pullum, L.L. (2001). Software Fault Tolerance Techniques and Implementation, Artech House, Inc., Canton St. Norwood.
[27] [27] Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S. and Fang, B. (2020). A survey on access control in the age of Internet of Things, IEEE Internet of Things Journal 7(6): 4682–4696.
[28] [28] Randell, B. (1975). System structure for software fault tolerance, IEEE Transactions on Software Engineering SE-1(2): 220–232.
[29] [29] Randell, B. and Xu, J. (1994). The evolution of the recovery block concept, in M. Lyu (Ed), Software Fault Tolerance, Vol. 3, Wiley, Chichester, pp. 1–22.
[30] [30] Rodriguez, M., Kwiat, K.A. and Kamhoua, C.A. (2015). Modeling fault tolerant architectures with design diversity for secure systems, IEEE Military Communications Conference (MILCOM), Tampa, USA, pp. 1254–1263.
[31] [31] Saidane, A., Nicomette, V. and Deswarte, Y. (2009). The design of a generic intrusion-tolerant architecture for web servers, IEEE Transactions on Dependable and Secure Computing 6(1): 45–58.
[32] [32] Scarfone, K. and Mell, P. (2010). Intrusion detection and prevention systems, in P. Stavroulakis andM. Stamp (Eds), Handbook of Information and Communication Security, Springer, Berlin/Heidelberg, pp. 177–192.
[33] [33] Scott, R., Gault, J. and McAllister, D. (1985). The consensus recovery block, Total System Reliability Symposium, Gaithersburg, USA, pp. 74–85.
[34] [34] Sousa, P., Bessani, A. and Obelheiro, R. (2008). The forever service for fault/intrusion removal, Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, Glasgow, UK, p. 16.
[35] [35] Tarraf, D.C., Kamhoua, C.A., Kwiat, K.A. and Njilla, L. (2017). Majority is not always supreme: Less can be more when voting with compromised nodes, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, pp. 9–12.
[36] [36] Veríssimo, P.E., Neves, N.F. and Correia, M.P. (2003). Intrusion-tolerant architectures: Concepts and design, in R. Lemos et al. (Eds), Architecting Dependable Systems, Springer, Berlin, pp. 3–36.
[37] [37] Vöelp, M. and Verissimo, P. (2018). Intrusion-tolerant autonomous driving, IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, Singapore, pp. 130–133.
[38] [38] Wang, L., Ren, S., Korel, B., Kwiat, K.A. and Salerno, E. (2014). Improving system reliability against rational attacks under given resources, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(4): 446–456.
[39] [39] Ylmaz, E.N. and Gänen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems, Computers Security 77: 94–105.
[40] [40] Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W. and Coble, J. (2019). Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data, IEEE Transactions on Industrial Informatics 15(7): 4362–4369.
[41] [41] Zhou, Y., Han, M., Liu, L., He, J.S. and Wang, Y. (2018). Deep learning approach for cyberattack detection, IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops, Honolulu, USA, pp. 262–267.