To read this content please select one of the options below:

Robust intrusion tolerance in information systems

Nong Ye (Arizona State University, Information and Systems Assurance Laboratory, Tempe, Arizona, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 March 2001

4101

Abstract

Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability, integrity, and confidentiality. Intrusions into information systems cause faults of software and hardware components in information systems, which then lead to errors and failures of system performance. Intrusion tolerance requires information systems to function correctly in a timely manner even under impact of intrusions. In this paper, we discuss causes, chain effects and barriers of intrusions into information systems, and reveal roles that various information security techniques play in intrusion tolerance. We present two robust intrusion tolerance methods through fault masking: Taguchi’s robust method for system configuration and sharing of resources via an information infrastructure for redundancy.

Keywords

Citation

Ye, N. (2001), "Robust intrusion tolerance in information systems", Information Management & Computer Security, Vol. 9 No. 1, pp. 38-43. https://doi.org/10.1108/09685220110366786

Publisher

:

MCB UP Ltd

Copyright © 2001, MCB UP Limited

Related articles