메뉴 건너뛰기




Volumn 5, Issue 1, 2012, Pages 30-39

Creating a cyber moving target for critical infrastructure applications using platform diversity

Author keywords

Cyber moving target; Cyber survivability; Diversity; Platform heterogeneity; Virtualization

Indexed keywords

CYBER SURVIVABILITY; DIVERSITY; MOVING TARGETS; PLATFORM HETEROGENEITY; VIRTUALIZATIONS;

EID: 84858289309     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2012.01.002     Document Type: Article
Times cited : (72)

References (28)
  • 1
    • 84858290417 scopus 로고    scopus 로고
    • Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19
    • R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts, October 19, 2010 http://www.masshightech.com/stories/2010/10/18/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html.
    • (2010)
    • Brown, R.1
  • 2
    • 84858287019 scopus 로고    scopus 로고
    • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS-ALERT-10-301-01 - Control System Internet Accessibility, Department of Homeland Security, Washington, DC, October 28
    • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS-ALERT-10-301-01 - Control System Internet Accessibility, Department of Homeland Security, Washington, DC, October 28, 2010 http://www.us-cert.gov/control_systems/pdf/ICS-Alert-10-301-01.pdf.
    • (2010)
  • 3
    • 84858297741 scopus 로고    scopus 로고
    • US Air Force Chief Scientist, Report on Technology Horizons: A Vision for Air Force Science and Technology During 2010-2030, Volume 1, Technical Report AF/ST-TR-10-01-PR, Department of the Air Force, Washington, DC
    • US Air Force Chief Scientist, Report on Technology Horizons: A Vision for Air Force Science and Technology During 2010-2030, Volume 1, Technical Report AF/ST-TR-10-01-PR, Department of the Air Force, Washington, DC, 2010.
    • (2010)
  • 4
    • 84858276207 scopus 로고    scopus 로고
    • National Security Council, Cybersecurity Progress after President Obama's Address, The White House, Washington, DC, July 14
    • National Security Council, Cybersecurity Progress after President Obama's Address, The White House, Washington, DC, July 14, 2010.
    • (2010)
  • 6
    • 84858297739 scopus 로고    scopus 로고
    • Virtualization in Linux, OpenVZ
    • K. Kolyshkin, Virtualization in Linux, OpenVZ, 2006 ftp://openvz.org/doc/openvz-intro.pdf.
    • (2006)
    • Kolyshkin, K.1
  • 7
    • 0029713612 scopus 로고    scopus 로고
    • CoCheck: checkpointing and process migration for MPI
    • in: Proceedings of the Tenth International Parallel Processing Symposium
    • G. Stellner, CoCheck: checkpointing and process migration for MPI, in: Proceedings of the Tenth International Parallel Processing Symposium, 1996, pp. 526-531.
    • (1996) , pp. 526-531
    • Stellner, G.1
  • 9
    • 84858276210 scopus 로고    scopus 로고
    • HDF Group, HDF4 Reference Manual, Champaign, Illinois
    • HDF Group, HDF4 Reference Manual, Champaign, Illinois, 2010, ftp://hdfgroup.org/HDF/Documentation/HDF4.2.5/HDF425_RefMan.pdf.
    • (2010)
  • 10
    • 84858276209 scopus 로고    scopus 로고
    • lxc Linux Containers, lxc man pages.
    • lxc Linux Containers, lxc man pages.
  • 11
    • 84858290420 scopus 로고    scopus 로고
    • Parallels, Clustering in Parallels Virtuozzo-Based Systems, White Paper, Renton, Washington
    • Parallels, Clustering in Parallels Virtuozzo-Based Systems, White Paper, Renton, Washington, 2009.
    • (2009)
  • 12
    • 42149132499 scopus 로고    scopus 로고
    • Securing FreeBSD using jail
    • Sarmiento E. Securing FreeBSD using jail. System Administration 2001, 10(5):31-37.
    • (2001) System Administration , vol.10 , Issue.5 , pp. 31-37
    • Sarmiento, E.1
  • 13
    • 84858290418 scopus 로고    scopus 로고
    • Virtualization with KVM, Linux Journal, February 1
    • I. Habib, Virtualization with KVM, Linux Journal, February 1, 2008 http://www.linuxjournal.com/article/9764.
    • (2008)
    • Habib, I.1
  • 15
    • 35048854568 scopus 로고    scopus 로고
    • Cetus - an extensible compiler infrastructure for source-to-source transformation
    • in: Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing
    • S. Lee, T. Johnson, R. Eigenmann, Cetus - an extensible compiler infrastructure for source-to-source transformation, in: Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing, 2003, pp. 539-553.
    • (2003) , pp. 539-553
    • Lee, S.1    Johnson, T.2    Eigenmann, R.3
  • 17
    • 84858297738 scopus 로고    scopus 로고
    • Trusted Computing Group, TPM Main Specification Level 2, Version 1.2, Revision 116, Beaverton, Oregon
    • Trusted Computing Group, TPM Main Specification Level 2, Version 1.2, Revision 116, Beaverton, Oregon, 2011, http://www.trustedcomputinggroup.org/resources/tpm_main_specification.
    • (2011)
  • 18
    • 14844295011 scopus 로고    scopus 로고
    • Direct anonymous attestation
    • in: Proceedings of the Eleventh ACM Conference on Computer and Communications Security
    • E. Brickell, J. Camenisch, L. Chen, Direct anonymous attestation, in: Proceedings of the Eleventh ACM Conference on Computer and Communications Security, 2004, pp. 132-145.
    • (2004) , pp. 132-145
    • Brickell, E.1    Camenisch, J.2    Chen, L.3
  • 19
    • 77950793246 scopus 로고    scopus 로고
    • Modeling modern network attacks and countermeasures using attack graphs
    • in: Proceedings of the Annual Computer Security Applications Conference
    • K. Ingols, M. Chu, R. Lippmann, S. Webster, S. Boyer, Modeling modern network attacks and countermeasures using attack graphs, in: Proceedings of the Annual Computer Security Applications Conference, 2009, pp. 117-126.
    • (2009) , pp. 117-126
    • Ingols, K.1    Chu, M.2    Lippmann, R.3    Webster, S.4    Boyer, S.5
  • 20
    • 12444331951 scopus 로고    scopus 로고
    • CLIP: a checkpointing tool for message passing parallel programs
    • in: Proceedings of the ACM/IEEE Conference on Supercomputing
    • Y. Chen, K. Li, J. Plank, CLIP: a checkpointing tool for message passing parallel programs, in: Proceedings of the ACM/IEEE Conference on Supercomputing, 1997, p. 33.
    • (1997) , pp. 33
    • Chen, Y.1    Li, K.2    Plank, J.3
  • 21
    • 85059766484 scopus 로고    scopus 로고
    • Live migration of virtual machines
    • in: Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation
    • C. Clark, K. Fraser, S. Hand, J. Hansen, E. Jul, C. Limpach, I. Pratt, A. Warfield, Live migration of virtual machines, in: Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation, vol. 2, 2005, pp. 273-286.
    • (2005) , vol.2 , pp. 273-286
    • Clark, C.1    Fraser, K.2    Hand, S.3    Hansen, J.4    Jul, E.5    Limpach, C.6    Pratt, I.7    Warfield, A.8
  • 22
    • 84858287021 scopus 로고    scopus 로고
    • Intrusion tolerance to mitigate attacks that persist presented at the Secure and Resilient Cyber Architectures Conference
    • A. Sood, Intrusion tolerance to mitigate attacks that persist presented at the Secure and Resilient Cyber Architectures Conference, 2010.
    • (2010)
    • Sood, A.1
  • 23
    • 70449380100 scopus 로고    scopus 로고
    • Securing web servers using self cleansing intrusion tolerance SCIT
    • in: Proceedings of the Second International Conference on Dependability
    • A. Bangalore, A. Sood, Securing web servers using self cleansing intrusion tolerance SCIT, in: Proceedings of the Second International Conference on Dependability, 2009, pp. 60-65.
    • (2009) , pp. 60-65
    • Bangalore, A.1    Sood, A.2
  • 24
    • 77952628807 scopus 로고    scopus 로고
    • Incorruptible self cleansing intrusion tolerance and its application to DNS security
    • Huang Y., Arsenault D., Sood A. Incorruptible self cleansing intrusion tolerance and its application to DNS security. Journal of Networks 2006, 1(5):21-30.
    • (2006) Journal of Networks , vol.1 , Issue.5 , pp. 21-30
    • Huang, Y.1    Arsenault, D.2    Sood, A.3
  • 25
    • 70449389986 scopus 로고    scopus 로고
    • Automating intrusion response via virtualization for realizing uninterruptible web services
    • in: Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications
    • Y. Huang, A. Ghosh, Automating intrusion response via virtualization for realizing uninterruptible web services, in: Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications, 2009, pp. 114-117.
    • (2009) , pp. 114-117
    • Huang, Y.1    Ghosh, A.2
  • 26
    • 77956571453 scopus 로고    scopus 로고
    • A security evaluation of a novel resilient web serving architecture: lessons learned through industry/academia collaboration
    • in: Proceedings of the International Conference on Dependable Systems and Networks Workshops
    • Y. Huang, A. Ghosh, T. Bracewell, B. Mastropietro, A security evaluation of a novel resilient web serving architecture: lessons learned through industry/academia collaboration, in: Proceedings of the International Conference on Dependable Systems and Networks Workshops, 2010, pp. 188-193.
    • (2010) , pp. 188-193
    • Huang, Y.1    Ghosh, A.2    Bracewell, T.3    Mastropietro, B.4
  • 27
    • 84969348146 scopus 로고    scopus 로고
    • Storage: high-availability file server with heartbeat
    • Blackmon S., Nguyen J. Storage: high-availability file server with heartbeat. System Administration 2001, 10(9):24-32.
    • (2001) System Administration , vol.10 , Issue.9 , pp. 24-32
    • Blackmon, S.1    Nguyen, J.2
  • 28
    • 12444259113 scopus 로고    scopus 로고
    • A high-availability clustering architecture with data integrity guarantees
    • in: Proceedings of the IEEE International Conference on Cluster Computing
    • R. Rabbat, T. McNeal, T. Burke, A high-availability clustering architecture with data integrity guarantees, in: Proceedings of the IEEE International Conference on Cluster Computing, 2001. pp. 178-182.
    • (2001) , pp. 178-182
    • Rabbat, R.1    McNeal, T.2    Burke, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.