Survival by defense-enabling

Partha Pal, Franklin Webber, Richard Schantz, Joseph Loyall, Ronald Watro, William Sanders, Michel Cukier, Jeanna Gossett

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. Our approach, which we call "survival by defense" is based on the observation that many applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. This paper describes the concept of "survival by defense" in general and explains the assumptions on which it depends. We will also explain the goals of survival by defense and how they can be achieved.

Original languageEnglish (US)
Title of host publicationFoundations of Intrusion Tolerant Systems, OASIS 2003
EditorsJaynarayan H. Lala
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages261-269
Number of pages9
ISBN (Electronic)076952057X, 9780769520575
DOIs
StatePublished - Jan 1 2003
EventFoundations of Intrusion Tolerant Systems, OASIS 2003 - Los Alamitos, United States
Duration: Dec 1 2003 → …

Publication series

NameFoundations of Intrusion Tolerant Systems, OASIS 2003

Other

OtherFoundations of Intrusion Tolerant Systems, OASIS 2003
Country/TerritoryUnited States
CityLos Alamitos
Period12/1/03 → …

Keywords

  • Application software
  • Computer networks
  • Computer security
  • Cryptography
  • Hardware
  • Intrusion detection
  • Operating systems
  • Protection
  • Runtime
  • Software systems

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Cite this