Foo et al., 2008 - Google Patents
Intrusion response systems: a surveyFoo et al., 2008
View PS- Document ID
- 8608358050942731739
- Author
- Foo B
- Glause M
- Howard G
- Wu Y
- Bagchi S
- Spafford E
- Publication year
- Publication venue
- Information assurance: dependability and security in networked systems
External Links
Snippet
The occurrence of outages due to failures in today's information technology infrastructure is a real problem that still begs a satisfactory solution. The backbone of the ubiquitous information technology infrastructure is formed by distributed systems—distributed …
- 230000004044 response 0 title abstract description 199
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/541—Interprogramme communication; Intertask communication via adapters, e.g. between incompatible applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/465—Distributed object oriented systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12166785B2 (en) | Systems and methods for predictive analysis of potential attack patterns based on contextual security information | |
Borky et al. | Protecting information with cybersecurity | |
Azeez et al. | Intrusion detection and prevention systems: an updated review | |
Agarwal et al. | A closer look at intrusion detection system for web applications | |
Foo et al. | ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
US9774616B2 (en) | Threat evaluation system and method | |
Sobh | Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art | |
CN118054973B (en) | Active defense method, system, device and medium based on network port lock | |
Deka et al. | Network defense: Approaches, methods and techniques | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
Rodríguez et al. | Modelling security of critical infrastructures: a survivability assessment | |
Shameli-Sendi et al. | A Retroactive‐Burst Framework for Automated Intrusion Response System | |
Foo et al. | Intrusion response systems: a survey | |
Lee et al. | Assessment of the distributed ledger technology for energy sector industrial and operational applications using the mitre att&ck® ics matrix | |
Ahmad et al. | Security challenges from abuse of cloud service threat | |
Guelzim et al. | Formal methods of attack modeling and detection | |
Toumi et al. | Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment | |
US20250039228A1 (en) | System and method for attacker interdiction using track and trace user and entity behavior analysis | |
Rahmawati | Advanced Traffic Shaping and Filtering Mechanisms to Combat Phishing Attacks in Integrated E-Commerce Cloud Environments | |
US20250317466A1 (en) | System and Method for Improving Cybersecurity of a Network | |
Tiwari et al. | Cost Tradeoffs for Information Security Assurance. | |
Gauhar Fatima et al. | A Study on Intrusion Detection | |
El Hayat | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System |