Open Access

Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods

International Journal of Applied Mathematics and Computer Science's Cover Image
International Journal of Applied Mathematics and Computer Science
Big Data and Artificial Intelligence for Cooperative Vehicle-Infrastructure Systems (Special section, pp. 523-599), Baozhen Yao, Shuaian (Hans) Wang and Sobhan (Sean) Asian (Eds.)

Cite

Alladi, T., Chamola, V. and Zeadally, S. (2020). Industrial control systems: Cyberattack trends and countermeasures, Computer Communications 155: 1–8.10.1016/j.comcom.2020.03.007 Search in Google Scholar

Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. and Wright, R.N. (2018). From keys to databases—Real-world applications of secure multi-party computation, The Computer Journal 61(12): 1749–1771.10.1093/comjnl/bxy090 Search in Google Scholar

Avizienis, A. (1985). The N-version approach to fault-tolerant software, IEEE Transactions on Software Engineering SE-11(12): 1491–1501.10.1109/TSE.1985.231893 Search in Google Scholar

Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1): 11–33.10.1109/TDSC.2004.2 Search in Google Scholar

Babay, A., Tantillo, T., Aron, T., Platania, M. and Amir, Y. (2018). Network-attack-resilient intrusion-tolerant SCADA for the power grid, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Luxemburg, Luxemburg, pp. 255–266. Search in Google Scholar

Bondavalli, A., Di Giandomenico, F. and Xu, J. (1993). A cost-effective and flexible scheme for software fault tolerance, Computer Systems: Science & Engineering 8(4): 234–244. Search in Google Scholar

Di Giandomenico, F. and Masetti, G. (2021). Basic aspects in redundancy-based intrusion tolerance, 14th International Conference on Computational Intelligence in Security for Information Systems/12th International Conference on European Transnational Educational, Bilbao, Spain, pp. 192–202. Search in Google Scholar

Di Giandomenico, F. and Strigini, L. (1990). Adjudicators for diverse-redundant components, Proceedings of the 9th Symposium on Reliable Distributed Systems, Huntsville, USA, pp. 114–123. Search in Google Scholar

Distler, T. (2022). Byzantine fault-tolerant state-machine replication from a system’s perspective, ACM Computing Surveys 54(1): 1–38.10.1145/3436728 Search in Google Scholar

Dohi, T., Trivedi, K. S. and Avritzer, A. (2020). Hand-book of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions, WSPC, Singapore.10.1142/11673 Search in Google Scholar

Garcia, M., Bessani, A., Gashi, I., Neves, N. and Obelheiro, R. (2014). Analysis of operating system diversity for intrusion tolerance, Software—Practice & Experience 44(6): 735–770.10.1002/spe.2180 Search in Google Scholar

Gashi, I., Povyakalo, A. and Strigini, L. (2016). Diversity, safety and security in embedded systems: Modelling adversary effort and supply chain risks, 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden, pp. 13–24. Search in Google Scholar

Gorbenko, A., Romanovsky, A., Tarasyuk, O. and Biloborodov, O. (2020). From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Transactions on Reliability 69(1): 22–39.10.1109/TR.2019.2897248 Search in Google Scholar

Haphuriwat, N. and Bier, V.M. (2011). Trade-offs between target hardening and overarching protection, European Journal of Operational Research 213(1): 320–328.10.1016/j.ejor.2011.03.035 Search in Google Scholar

Hardekopf, B., Kwiat, K. and Upadhyaya, S. (2001). Secure and fault-tolerant voting in distributed systems, IEEE Aerospace Conference Proceedings, Gothenburg, Sweden, pp. 1117–1126. Search in Google Scholar

Khan, M. and Babay, A. (2021). Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN21), Taipei, Taiwan, pp. 14–25. Search in Google Scholar

Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity 2(1): 1–20.10.1186/s42400-019-0038-7 Search in Google Scholar

Laprie, J.-C., Arlat, J., Beounes, C. and Kanoun, K. (1990). Definition and analysis of hardware-and software-fault-tolerant architectures, Computer 23(7): 39–51.10.1109/2.56851 Search in Google Scholar

Littlewood, B. and Strigini, L. (2000). A discussion of practices for enhancing diversity in software designs, Technical Report DISPO LS DI TR-04 V1 1d, Centre for Software Reliability, City University, London, https://openaccess.city.ac.uk/id/eprint/275/. Search in Google Scholar

Lyu, M.R. (1995). Software Fault Tolerance, John Wiley & Sons Ltd, Hoboken. Search in Google Scholar

Majdzik, P. (2022). A feasible schedule for parallel assembly tasks in flexible manufacturing systems, International Journal of Applied Mathematics and Computer Science 32(1): 51–63, DOI: 10.34768/amcs-2022-0005. Open DOISearch in Google Scholar

Mejdi, S., Messaoud, A. and Ben Abdennour, R. (2020). Fault tolerant multicontrollers for nonlinear systems: A real validation on a chemical process, International Journal of Applied Mathematics and Computer Science 30(1): 61–74, DOI: 10.34768/amcs-2020-0005. Open DOISearch in Google Scholar

Nascimento, A.S., Rubira, C.M.F., Burrows, R. and Castor, F. (2013). A systematic review of design diversity-based solutions for fault-tolerant SOAs, Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, EASE’13, Porto de Galinhas, Brazil, pp. 107–118. Search in Google Scholar

Obelheiro, R., Bessani, A., Lung, L. and Correia, M. (2006). How practical are intrusion-tolerant distributed systems?, Technical Report DI-FCUL TR 06–15, Department of Informatics, University of Lisbon, Lisbon, https://repositorio.ul.pt/handle/10451/14093. Search in Google Scholar

Puig, V., Sauter, D., Aubrun, C. and Schulte, H. (Eds) (2018). Advanced Diagnosis and Fault-Tolerant Control Methods (special section), International Journal of Applied Mathematics and Computer Science 28(2): 233–333. Search in Google Scholar

Pullum, L.L. (2001). Software Fault Tolerance Techniques and Implementation, Artech House, Inc., Canton St. Norwood. Search in Google Scholar

Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S. and Fang, B. (2020). A survey on access control in the age of Internet of Things, IEEE Internet of Things Journal 7(6): 4682–4696.10.1109/JIOT.2020.2969326 Search in Google Scholar

Randell, B. (1975). System structure for software fault tolerance, IEEE Transactions on Software Engineering SE-1(2): 220–232.10.1109/TSE.1975.6312842 Search in Google Scholar

Randell, B. and Xu, J. (1994). The evolution of the recovery block concept, in M. Lyu (Ed), Software Fault Tolerance, Vol. 3, Wiley, Chichester, pp. 1–22. Search in Google Scholar

Rodriguez, M., Kwiat, K.A. and Kamhoua, C.A. (2015). Modeling fault tolerant architectures with design diversity for secure systems, IEEE Military Communications Conference (MILCOM), Tampa, USA, pp. 1254–1263. Search in Google Scholar

Saidane, A., Nicomette, V. and Deswarte, Y. (2009). The design of a generic intrusion-tolerant architecture for web servers, IEEE Transactions on Dependable and Secure Computing 6(1): 45–58.10.1109/TDSC.2008.1 Search in Google Scholar

Scarfone, K. and Mell, P. (2010). Intrusion detection and prevention systems, in P. Stavroulakis and M. Stamp (Eds), Handbook of Information and Communication Security, Springer, Berlin/Heidelberg, pp. 177–192.10.1007/978-3-642-04117-4_9 Search in Google Scholar

Scott, R., Gault, J. and McAllister, D. (1985). The consensus recovery block, Total System Reliability Symposium, Gaithersburg, USA, pp. 74–85. Search in Google Scholar

Sousa, P., Bessani, A. and Obelheiro, R. (2008). The forever service for fault/intrusion removal, Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, Glasgow, UK,p.16. Search in Google Scholar

Tarraf, D.C., Kamhoua, C.A., Kwiat, K.A. and Njilla, L. (2017). Majority is not always supreme: Less can be more when voting with compromised nodes, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, pp. 9–12. Search in Google Scholar

Veríssimo, P.E., Neves, N.F. and Correia, M.P. (2003). Intrusion-tolerant architectures: Concepts and design, in R. Lemos et al. (Eds), Architecting Dependable Systems, Springer, Berlin, pp. 3–36.10.1007/3-540-45177-3_1 Search in Google Scholar

Vöelp, M. and Verissimo, P. (2018). Intrusion-tolerant autonomous driving, IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, Singapore, pp. 130–133. Search in Google Scholar

Wang, L., Ren, S., Korel, B., Kwiat, K.A. and Salerno, E. (2014). Improving system reliability against rational attacks under given resources, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(4): 446–456.10.1109/TSMC.2013.2263126 Search in Google Scholar

Ylmaz, E.N. and Gänen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems, Computers & Security 77: 94–105.10.1016/j.cose.2018.04.004 Search in Google Scholar

Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W. and Coble, J. (2019). Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data, IEEE Transactions on Industrial Informatics 15(7): 4362–4369.10.1109/TII.2019.2891261 Search in Google Scholar

Zhou, Y., Han, M., Liu, L., He, J.S. and Wang, Y. (2018). Deep learning approach for cyberattack detection, IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops, Honolulu, USA, pp. 262–267. Search in Google Scholar

eISSN:
2083-8492
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Mathematics, Applied Mathematics