Download now Free registration required
This paper presented the CIS protection service, implemented by highly resilient distributed devices, aimed at protecting critical information infrastructures. The CIS has two distinguishing features: it is intrusion-tolerant, and it supports a rich access control model that takes into account application semantics. The design of this protection device solves the non-trivial problem of ensuring transparent intrusion-tolerant operation for standard protocols and components. The authors implemented two versions of the CIS prototype, one using physical replicas, and another using VM replica. A set of experiments were conducted in order to evaluate the behavior of both versions in face of DoS attacks.
- Format: PDF
- Size: 465.7 KB