Robust intrusion tolerance in information systems

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in information systems, which then lead to errors and failures of system performance. Intrusion tolerance requires information systems to function correctly in a timely manner even under impact of intrusions. In this paper, we discuss causes, chain effects and barriers of intrusions into information systems, and reveal roles that various information security techniques play in intrusion tolerance. We present two robust intrusion tolerance methods through fault masking: Taguchi's robust method for system configuration and sharing of resources via an information infrastructure for redundancy.

Original languageEnglish (US)
Pages (from-to)38-43
Number of pages6
JournalInformation Management and Computer Security
Volume9
Issue number1
StatePublished - 2001

Fingerprint

Information systems
Security of data
Computer hardware
Redundancy
Tolerance
Availability
Fault

Keywords

  • Computer security
  • Data security
  • Fault tolerance
  • Information systems

ASJC Scopus subject areas

  • Software
  • Engineering (miscellaneous)
  • Industrial and Manufacturing Engineering

Cite this

Robust intrusion tolerance in information systems. / Ye, Nong.

In: Information Management and Computer Security, Vol. 9, No. 1, 2001, p. 38-43.

Research output: Contribution to journalArticle

@article{b5f4fe17e48a4463a6e96727cee932ab,
title = "Robust intrusion tolerance in information systems",
abstract = "Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in information systems, which then lead to errors and failures of system performance. Intrusion tolerance requires information systems to function correctly in a timely manner even under impact of intrusions. In this paper, we discuss causes, chain effects and barriers of intrusions into information systems, and reveal roles that various information security techniques play in intrusion tolerance. We present two robust intrusion tolerance methods through fault masking: Taguchi's robust method for system configuration and sharing of resources via an information infrastructure for redundancy.",
keywords = "Computer security, Data security, Fault tolerance, Information systems",
author = "Nong Ye",
year = "2001",
language = "English (US)",
volume = "9",
pages = "38--43",
journal = "Information and Computer Security",
issn = "2056-4961",
publisher = "Emerald Group Publishing Ltd.",
number = "1",

}

TY - JOUR

T1 - Robust intrusion tolerance in information systems

AU - Ye, Nong

PY - 2001

Y1 - 2001

N2 - Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in information systems, which then lead to errors and failures of system performance. Intrusion tolerance requires information systems to function correctly in a timely manner even under impact of intrusions. In this paper, we discuss causes, chain effects and barriers of intrusions into information systems, and reveal roles that various information security techniques play in intrusion tolerance. We present two robust intrusion tolerance methods through fault masking: Taguchi's robust method for system configuration and sharing of resources via an information infrastructure for redundancy.

AB - Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in information systems, which then lead to errors and failures of system performance. Intrusion tolerance requires information systems to function correctly in a timely manner even under impact of intrusions. In this paper, we discuss causes, chain effects and barriers of intrusions into information systems, and reveal roles that various information security techniques play in intrusion tolerance. We present two robust intrusion tolerance methods through fault masking: Taguchi's robust method for system configuration and sharing of resources via an information infrastructure for redundancy.

KW - Computer security

KW - Data security

KW - Fault tolerance

KW - Information systems

UR - http://www.scopus.com/inward/record.url?scp=0035780462&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0035780462&partnerID=8YFLogxK

M3 - Article

VL - 9

SP - 38

EP - 43

JO - Information and Computer Security

JF - Information and Computer Security

SN - 2056-4961

IS - 1

ER -