Mason Archival Repository Service

Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures

Show simple item record

dc.contributor.advisor Sood, Arun
dc.contributor.author Nagarajan, Ajay
dc.creator Nagarajan, Ajay
dc.date.accessioned 2018-10-22T01:21:17Z
dc.date.available 2018-10-22T01:21:17Z
dc.date.issued 2017
dc.identifier.uri http://hdl.handle.net/1920/11309
dc.description.abstract The current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These systems require a priori information about attack patterns and system vulnerabilities. With ever-increasing bandwidth and thousands of unique malware signatures coming out every day, it is becoming impractical to prevent every intrusion. And so, intrusion tolerance assumes that intrusions are inevitable and focuses efforts on minimizing the impact of intrusions. The variety and complexity of cyber-attacks is increasing. Various industry data breach investigation reports suggest that customized malware are difficult to detect and data ex-filtration often occurs over a period of days, weeks and months. The attackers’ strong motivation leads to organized and targeted cyber-attacks. The current intrusion detection and prevention approaches are reactive in nature and inadequate to prevent all attacks.
dc.format.extent 201 pages
dc.language.iso en
dc.rights Copyright 2017 Ajay Nagarajan
dc.subject Computer science
dc.subject Cyber Resilience
dc.subject Intrusion Tolerance
dc.subject Proactive Recovery
dc.subject Risk Mitigation
dc.subject SCIT
dc.subject Self-cleansing Intrusion Tolerance
dc.title Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures
dc.type Dissertation
thesis.degree.level Ph.D.
thesis.degree.discipline Computer Science
thesis.degree.grantor George Mason University


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MARS


Browse

My Account

Statistics