Search For:

Displaying 1-11 out of 11 total
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
Found in: Availability, Reliability and Security, International Conference on
By David Arsenault, Arun Sood, Yih Huang
Issue Date:April 2007
pp. 343-350
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information systems. Complex systems cannot be fully verified under all possible conditio...
 
Closing Cluster Attack Windows Through Server Redundancy and Rotations
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Yih Huang, David Arsenault, Arun Sood
Issue Date:May 2006
pp. 21
It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redundancy is spare servers. Cluster security, while universally recognized as an im...
 
Securing DNS Services through System Self Cleansing and Hardware Enhancements
Found in: Availability, Reliability and Security, International Conference on
By Yih Huang, David Arsenault, Arun Sood
Issue Date:April 2006
pp. 132-139
<p>Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are exploited by frequent, targeted attacks. The software vulnerabilities o...
 
Designing SCIT architecture pattern in a Cloud-based environment
Found in: Dependable Systems and Networks Workshops
By Quyen L. Nguyen,Arun Sood
Issue Date:June 2011
pp. 123-128
Cloud Computing has gained momentum in the IT world, due to its inherent elasticity that allows flexible on-demand computing resources such as CPU time, memory and storage size. However, Cloud security is a challenge. In this paper, we leverage Cloud servi...
 
Combining intrusion detection and recovery for enhancing system dependability
Found in: Dependable Systems and Networks Workshops
By Ajay Nagarajan,Quyen Nguyen,Robert Banks,Arun Sood
Issue Date:June 2011
pp. 25-30
Current cyber defenses are reactive and cannot protect against customized malware and other zero day attacks which persist for many weeks. Using Receiver Operating Characteristic curve analysis and damage cost models, we trade-off the true positive rate an...
 
SCIT and IDS architectures for reduced data ex-filtration
Found in: Dependable Systems and Networks Workshops
By Ajay Nagarajan, Arun Sood
Issue Date:July 2010
pp. 164-169
Today's approach to security is based on perimeter defense and relies heavily on firewalls, Intrusion detection systems (IDS) and Intrusion prevention systems. Despite years of research and investment in developing such reactive security methodologies, our...
 
A Comparison of Intrusion-Tolerant System Architectures
Found in: IEEE Security and Privacy
By Quyen L. Nguyen,Arun Sood
Issue Date:July 2011
pp. 24-31
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures.
 
Multiclass S-Reliability for Services in SOA
Found in: Software Engineering Advances, International Conference on
By Quyen L. Nguyen, Arun Sood
Issue Date:August 2010
pp. 514-519
In a Service-Oriented Architecture, a service contains a set of operations with clearly defined input and output parameters. In addition to these operations and traditional QoS, offered services need to publish different levels of intrusion tolerance for t...
 
Network Service Selection for Distributed Multimedia Applications
Found in: Computational Intelligence and Multimedia Applications, International Conference on
By Robert Simon, Arun Sood, Padmavathi Mundur
Issue Date:September 1999
pp. 388
An important question in the development of system support for distributed multimedia is the type of network service offered to applications. This paper compares two network service disciplines, Weighted Fair Queuing (WFQ) and Non-preemptive Earliest Deadl...
 
Comparative Analysis of Intrusion-Tolerant System Architectures
Found in: IEEE Security and Privacy
By Quyen L. Nguyen, Arun Sood
Publication Date: August 2010
pp. N/A
Today, institutions want to build open systems and provide services to the public via the Internet. Such systems would potentially expose security vulnerabilities, and become susceptible to attacks. Therefore, security is critical in order to ensure confid...
 
Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism
Found in: Dependable Systems and Networks Workshops
By Quyen Nguyen, Arun Sood
Issue Date:July 2010
pp. 176-181
Service-Oriented Architecture (SOA) paradigm facilitates the design of large systems as a set of loosely coupled services interacting with each other. These services, in turn, can be combined to form a more complex service. But, for services to be useful, ...
 
 1