메뉴 건너뛰기




Volumn , Issue , 2003, Pages 11-22

A holistic approach to service survivability

Author keywords

Intrusion detection; Overlay networks; Reliability; Survivability

Indexed keywords

AUTOMATION; COMMUNICATION SYSTEMS; COMPUTER SYSTEM FIREWALLS; HTTP; HUMAN COMPUTER INTERACTION; INTERNET; PUBLIC POLICY; QUERY LANGUAGES; RELIABILITY;

EID: 2642522187     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1036921.1036923     Document Type: Conference Paper
Times cited : (34)

References (79)
  • 2
    • 84862356642 scopus 로고    scopus 로고
    • DARPA OASIS (Organically Assured and Survivable Information System), http://www.tolerantsystems.org/index.html.
  • 3
    • 84862361326 scopus 로고    scopus 로고
    • Malicious- And accidental-fault tolerance for internet applications
    • IST Programme
    • Malicious- and Accidental-Fault Tolerance for Internet Applications. RTD Research Project IST-1999-11583, IST Programme, http://maftia.org/.
    • RTD Research Project IST-1999-11583
  • 4
    • 84862356244 scopus 로고    scopus 로고
    • Microsoft security tool kit: Installing and securing a new windows 2000 system
    • Microsoft Security Tool Kit: Installing and Securing a New Windows 2000 System. Microsoft TechNet. http://www.microsoft.com/technet/ security/tools/tools/w2knew.asp.
    • Microsoft TechNet
  • 5
    • 84862356648 scopus 로고    scopus 로고
    • Microsoft Windows Software Update Services. http://www.microsoft.com/ windows2000/windowsupdate/sus/.
  • 7
    • 84862361328 scopus 로고    scopus 로고
    • RedHat 9 Security Advisories. https://rhn.redhat.com/errata/rh9-errata- security.html.
  • 9
    • 84862371886 scopus 로고    scopus 로고
    • Using network-based application recognition and access control lists for blocking the "Code Red" worm at network ingress points
    • Cisco Systems, Inc.
    • Using Network-Based Application Recognition and Access Control Lists for Blocking the "Code Red" Worm at Network Ingress Points. Technical report, Cisco Systems, Inc.
    • Technical Report
  • 10
    • 34547985501 scopus 로고    scopus 로고
    • Web Server Survey, http://www.securityspace. com/s_survey/data/200304/.
    • Web Server Survey
  • 11
    • 84862362324 scopus 로고    scopus 로고
    • Intrusion Tolerant Server Infrastructure. http://www.tolerantsystems.org/ ProjectSummaries/Intrusion_Tolerant_Serv%er_Infrastructure.html, 2000.
    • (2000) Intrusion Tolerant Server Infrastructure
  • 13
    • 2642519394 scopus 로고    scopus 로고
    • Cert Advisory CA-2003-04: January
    • Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/ CA-2003-04.html, January 2003.
    • (2003) MS-SQL Server Worm
  • 22
    • 0001655450 scopus 로고    scopus 로고
    • Design and evaluation of a wide-area event notification service
    • August
    • A. Carzaniga, D. Rosenblum, and A. Wolf. Design and evaluation of a wide-area event notification service. In ACM Transactions on Computer Systems, volume 19(3), pages 332-383, August 2001.
    • (2001) ACM Transactions on Computer Systems , vol.19 , Issue.3 , pp. 332-383
    • Carzaniga, A.1    Rosenblum, D.2    Wolf, A.3
  • 30
    • 8644229619 scopus 로고    scopus 로고
    • The art of port scanning
    • 7, September
    • Fyodor. The art of port scanning. Phrack 51, 7, September 1997. http://www.phrack.com/phrack/51/P51-11.
    • (1997) Phrack , vol.51
  • 31
    • 0006411884 scopus 로고    scopus 로고
    • Inoculating software for survivability
    • A. K. Ghosh and J. M. Voas. Inoculating software for survivability. Communications of the ACM, 42(7):38-44, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.7 , pp. 38-44
    • Ghosh, A.K.1    Voas, J.M.2
  • 32
    • 2642573975 scopus 로고    scopus 로고
    • Host-based anomaly detection by wrapping file system accesses
    • Columbia University Department of Computer Science, April
    • S. Hershkop, R. Ferster, L. H. Bui, K. Wang, and S. J. Stolfo. Host-based anomaly detection by wrapping file system accesses. Technical report, Columbia University Department of Computer Science, April 2003.
    • (2003) Technical Report
    • Hershkop, S.1    Ferster, R.2    Bui, L.H.3    Wang, K.4    Stolfo, S.J.5
  • 36
    • 0004118981 scopus 로고
    • The nides statistical component: Description and justification
    • SRI International
    • H. S. Javitz and A. Valdes. The nides statistical component: Description and justification. Technical report, SRI International, 1993.
    • (1993) Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 39
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • Nov.
    • S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, Nov. 1998.
    • (1998) RFC , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 42
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • December
    • C. Ko, G. Fink, and K. Levitt. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference, pages 134-144, December 1994.
    • (1994) 10th Annual Computer Security Applications Conference , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 43
    • 2642548739 scopus 로고    scopus 로고
    • Feedback control applied to survivability: A host-based autonomic defense system
    • September
    • O. Kreidl and T. Frazier. Feedback control applied to survivability: a host-based autonomic defense system. IEEE Transactions on Reliability, Vol. 52, No. 3, September 2003.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.3
    • Kreidl, O.1    Frazier, T.2
  • 48
    • 0344008570 scopus 로고    scopus 로고
    • Detecting novel attacks by identifying anomalous network packet headers
    • Florida Institute of Technology, Melbourne, FL
    • M. Mahoney and P. Chan. Detecting novel attacks by identifying anomalous network packet headers. Technical Report CS-2001-2, Florida Institute of Technology, Melbourne, FL, 2001.
    • (2001) Technical Report CS-2001-2
    • Mahoney, M.1    Chan, P.2
  • 53
    • 2642560961 scopus 로고    scopus 로고
    • Crying wolf: False alarms hide attacks
    • June
    • D. Newman, J. Snyder, and R. Thayer. Crying wolf: False alarms hide attacks. Network World, June 2002. http://www.nwfusion.com/techinsider/ 2002/0624security1.html.
    • (2002) Network World
    • Newman, D.1    Snyder, J.2    Thayer, R.3
  • 59
    • 84862357381 scopus 로고    scopus 로고
    • Using context-based correlation in network operations management
    • Stanford University Department of Computer Science
    • L. Perrochon. Using context-based correlation in network operations management. Technical report, Stanford University Department of Computer Science, 1999. http://pavg.stanford.edu/cep/cidf.ps.gz.
    • (1999) Technical Report
    • Perrochon, L.1
  • 65
    • 84976720856 scopus 로고
    • The "worm" programs - Early experiments with a distributed computation
    • March
    • J. F. Shoch and J. A. Hupp. The "worm" programs - early experiments with a distributed computation. Communications of the ACM, 22(3):172-180, March 1982.
    • (1982) Communications of the ACM , vol.22 , Issue.3 , pp. 172-180
    • Shoch, J.F.1    Hupp, J.A.2
  • 70
    • 2642522650 scopus 로고    scopus 로고
    • Intrusion detection, diagnosis, and recovery with self-securing storage
    • Carnegie Mellon University
    • J. D. Strunk, G. R. Goodson, A. G. Pennington, C. A. Soules, and G. R. Ganger. Intrusion detection, diagnosis, and recovery with self-securing storage. Technical report, Carnegie Mellon University, 2002.
    • (2002) Technical Report
    • Strunk, J.D.1    Goodson, G.R.2    Pennington, A.G.3    Soules, C.A.4    Ganger, G.R.5
  • 74
    • 11144337234 scopus 로고    scopus 로고
    • SITAR: A scalable intrusion-tolerant architecture for distributed services
    • April
    • F. Wang and R. Uppalli. SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Volume II of the Proceedings of DISCEX III, pages 153-155, April 2003.
    • (2003) Volume II of the Proceedings of DISCEX III , vol.2 , pp. 153-155
    • Wang, F.1    Uppalli, R.2
  • 75
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. pages 133-145. IEEE Computer Society, 1999.
    • (1999) IEEE Computer Society , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3
  • 78
    • 33244459492 scopus 로고    scopus 로고
    • A stackable file system interface for linux
    • May
    • E. Zadok and I. Badulescu. A stackable file system interface for Linux. In LinuxExpo 99, May 1999.
    • (1999) LinuxExpo 99
    • Zadok, E.1    Badulescu, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.