Survival by defense-enabling

Partha P. Pal, Franklin Webber, Richard E. Schantz, Joseph Loyall, Ronald Watro, William H Sanders, Michel Cukier, Jeanna Gossett

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. Our approach, which we call "survival by defense" is based on the observation that many applications can be given increased resistance to malicious attack even though the environment in which they run is untrustworthy. This paper describes the concept of "survival by defense" in general and explains the assumptions on which it depends. We will also explain the goals of survival by defense and how they can be achieved.
Original languageEnglish (US)
Title of host publicationNSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms
EditorsVictor Raskin
PublisherAssociation for Computing Machinery
Pages71-78
ISBN (Print)978-1-58113-457-5
DOIs
StatePublished - 2001
EventNew Security Paradigms Workshop 2001 - Cloudcroft, United States
Duration: Sep 10 2001Sep 13 2001

Conference

ConferenceNew Security Paradigms Workshop 2001
Abbreviated titleNSPW01
Country/TerritoryUnited States
CityCloudcroft
Period9/10/019/13/01

Keywords

  • security research
  • ongoing attack
  • malicious attack
  • attack survival
  • new approach
  • intrusion tolerance
  • increased resistance
  • important objective
  • many application

Fingerprint

Dive into the research topics of 'Survival by defense-enabling'. Together they form a unique fingerprint.
  • Survival by defense-enabling

    Pal, P., Webber, F., Schantz, R., Loyall, J., Watro, R., Sanders, W., Cukier, M. & Gossett, J., 2003, Foundations of Intrusion Tolerant Systems, OASIS 2003. Lala, J. H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 261-269 9 p. 1264938

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cite this