Abstract
Security systems need be tested on the network, when they are Recently the cyber terror has become a crucial issue of the national security over the world. Cyber terror happens to attack the critical infrastructures that might result in a malfunction of a nationwide information network. Several techniques against such cyber terror have been proposed including firewall system, intrusion detection system, virtual private network, and intrusion tolerant system (ITS). Among those ITS is the one that tries to deliver useful services even if an attacker with malicious purpose were able to intrude the system. This paper implements a monitoring module of the system security information for ITS to provide continuous services. This module monitors the information of the hardware, memory, CPU processes, network traffic and others. This information being monitored will be reported to the administrator to maintain the ITS’s services.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Choi, C.S., Lee, K.G., Kim, H.K.: Study of Intrusion Tolerant Technology. Korea Institute of Security & Cryptology 13(1) (February 2003)
Hiltunen, M.A., et al.: Survivability through Customization and Adaptability: The Cactus Approach. In: DARPA Information Survivability Conference & Exposition (2000)
Min, B.J.: Development of Computer Security Technique. In: kisa, Symposium on Information Security (July 2002)
Kim, B.J., Kim, S.G.: Proposal of Scheme Relocation Resource and Server Duplicate against DoS. In: Korea Information Processing Society, vol. 10-A(1) (March 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, W., Soh, W., Kim, H., Park, J. (2006). Development of a Monitoring Module for ITS (Intrusion Tolerant System). In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_135
Download citation
DOI: https://doi.org/10.1007/11893011_135
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46542-3
Online ISBN: 978-3-540-46544-7
eBook Packages: Computer ScienceComputer Science (R0)