An adaptive mode control algorithm of a scalable intrusion tolerant architecture
نویسندگان
چکیده
منابع مشابه
An adaptive mode control algorithm of a scalable intrusion tolerant architecture
Article history: Received 31 January 2011 Received in revised form 31 May 2011 Accepted 28 October 2011 Available online 26 May 2012
متن کاملAn architecture for adaptive intrusion-tolerant applications
Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyberattacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed applications are increasingly threatened by sophisticated attacks that attempt to corrupt system components and violate service integrity. While variou...
متن کاملAn Architecture for an Adaptive Intrusion-Tolerant Server
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, an...
متن کاملAdaptive Neuro Fuzzy Sliding Mode Based Genetic Algorithm Control System to Control of a pH Neutralization Process
In this paper, an adaptive neuro fuzzy sliding mode based genetic algorithm (ANFSGA) controlsystem is proposed for a pH neutralization system. In pH reactors, determination and control of pH isa common problem concerning chemical-based industrial processes due to the non-linearity observedin the titration curve. An ANFSGA control system is designed to overcome the complexity of precisecontrol o...
متن کاملSITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services-A Technology Summary
This paper presents a intrusion tolerant architecture for distributed services, especially COTS servers. It is motivated by two observations: First, no security precautions can guarantee that a system will not be penetrated; Second, mission critical applications need to provide minimal level of services even under active attacks or partially compromised. The emphasis of proposed architecture is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 2012
ISSN: 0022-0000
DOI: 10.1016/j.jcss.2011.10.022