Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures

dc.contributor.advisorSood, Arun
dc.contributor.authorNagarajan, Ajay
dc.creatorNagarajan, Ajay
dc.date.accessioned2018-10-22T01:21:17Z
dc.date.available2018-10-22T01:21:17Z
dc.date.issued2017
dc.description.abstractThe current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These systems require a priori information about attack patterns and system vulnerabilities. With ever-increasing bandwidth and thousands of unique malware signatures coming out every day, it is becoming impractical to prevent every intrusion. And so, intrusion tolerance assumes that intrusions are inevitable and focuses efforts on minimizing the impact of intrusions. The variety and complexity of cyber-attacks is increasing. Various industry data breach investigation reports suggest that customized malware are difficult to detect and data ex-filtration often occurs over a period of days, weeks and months. The attackers’ strong motivation leads to organized and targeted cyber-attacks. The current intrusion detection and prevention approaches are reactive in nature and inadequate to prevent all attacks.
dc.format.extent201 pages
dc.identifier.urihttps://hdl.handle.net/1920/11309
dc.language.isoen
dc.rightsCopyright 2017 Ajay Nagarajan
dc.subjectComputer science
dc.subjectCyber Resilience
dc.subjectIntrusion tolerance
dc.subjectProactive Recovery
dc.subjectRisk Mitigation
dc.subjectSCIT
dc.subjectSelf-cleansing Intrusion Tolerance
dc.titleRealizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures
dc.typeDissertation
thesis.degree.disciplineComputer Science
thesis.degree.grantorGeorge Mason University
thesis.degree.levelPh.D.

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Nagarajan_gmu_0883E_11427.pdf
Size:
2.67 MB
Format:
Adobe Portable Document Format