Skip to main content

A Reliable Context-Aware Intrusion Tolerant System

  • Conference paper
On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops (OTM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4806))

Abstract

The next generation of computing applications will be facing new challenges due the changing environments in which they run. Ambient intelligent and pervasive environments combine heterogeneity, mobility and dynamism and building secure systems in these contexts becomes harder. Moreover the effective security requirements of the system would be identified at runtime and the system should support runtime reconfiguration of its defense capabilities. We propose in this paper an architecting framework for adaptive context-aware intrusion tolerant systems suitable for such environments. The adaptability concerns the runtime re-configuration of the deployed reaction policy together with the active monitors according to the context change.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks pages 2 (1999)

    Google Scholar 

  2. Jones, A.K., Sielken, R.S.: Computer System Intrusion Detection: A Survey. University of Virginia, Computer Science Technical Report pages 2 (2000)

    Google Scholar 

  3. Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. A CM MONET Journal pages 3 (2003)

    Google Scholar 

  4. Zhou, B., Shi, Q., Merabti, M.: Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. In: Computer Software and Applications Conference, 2006. COMPSAC 2006. 30th Annual International pages 3 (2006)

    Google Scholar 

  5. Zhong, S., Khoshgoftaar, T.M., Nath, S.: A Clustering Approach to Wireless Network Intrusion Detection. In: Proceedings of the 17th IEEE international Conference on Tools with Artificial intelligence pages 6 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Robert Meersman Zahir Tari Pilar Herrero

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saidane, A. (2007). A Reliable Context-Aware Intrusion Tolerant System. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops. OTM 2007. Lecture Notes in Computer Science, vol 4806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76890-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76890-6_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76889-0

  • Online ISBN: 978-3-540-76890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics