Skip to main content

Development of a Monitoring Module for ITS (Intrusion Tolerant System)

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Abstract

Security systems need be tested on the network, when they are Recently the cyber terror has become a crucial issue of the national security over the world. Cyber terror happens to attack the critical infrastructures that might result in a malfunction of a nationwide information network. Several techniques against such cyber terror have been proposed including firewall system, intrusion detection system, virtual private network, and intrusion tolerant system (ITS). Among those ITS is the one that tries to deliver useful services even if an attacker with malicious purpose were able to intrude the system. This paper implements a monitoring module of the system security information for ITS to provide continuous services. This module monitors the information of the hardware, memory, CPU processes, network traffic and others. This information being monitored will be reported to the administrator to maintain the ITS’s services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Choi, C.S., Lee, K.G., Kim, H.K.: Study of Intrusion Tolerant Technology. Korea Institute of Security & Cryptology 13(1) (February 2003)

    Google Scholar 

  2. Hiltunen, M.A., et al.: Survivability through Customization and Adaptability: The Cactus Approach. In: DARPA Information Survivability Conference & Exposition (2000)

    Google Scholar 

  3. http://www.kisa.or.kr

  4. Min, B.J.: Development of Computer Security Technique. In: kisa, Symposium on Information Security (July 2002)

    Google Scholar 

  5. Kim, B.J., Kim, S.G.: Proposal of Scheme Relocation Resource and Server Duplicate against DoS. In: Korea Information Processing Society, vol. 10-A(1) (March 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, W., Soh, W., Kim, H., Park, J. (2006). Development of a Monitoring Module for ITS (Intrusion Tolerant System). In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_135

Download citation

  • DOI: https://doi.org/10.1007/11893011_135

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46542-3

  • Online ISBN: 978-3-540-46544-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics