Intrusion Tolerance Techniques

Intrusion Tolerance Techniques

ISBN13: 9781522574927|ISBN10: 1522574921|EISBN13: 9781522574934
DOI: 10.4018/978-1-5225-7492-7.ch021
Cite Chapter Cite Chapter

MLA

Zhao, Wenbing. "Intrusion Tolerance Techniques." Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2019, pp. 257-267. https://doi.org/10.4018/978-1-5225-7492-7.ch021

APA

Zhao, W. (2019). Intrusion Tolerance Techniques. In M. Khosrow-Pour, D.B.A. (Ed.), Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (pp. 257-267). IGI Global. https://doi.org/10.4018/978-1-5225-7492-7.ch021

Chicago

Zhao, Wenbing. "Intrusion Tolerance Techniques." In Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics, edited by Mehdi Khosrow-Pour, D.B.A., 257-267. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7492-7.ch021

Export Reference

Mendeley
Favorite

Abstract

The authors believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such services is high, considering their essential roles in everyday operations of businesses and individuals as well. The impact of service unavailability and security breaches will only grow more serious. In this chapter, the authors survey the state-of-the-art techniques for building intrusion-tolerant systems. They also illustrate a few of the most urgent open issues for future research. Finally, they point out that to build secure and dependable systems we need a concerted effort in intrusion prevention, intrusion detection, and intrusion tolerance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.