Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Tolerance Techniques

Intrusion Tolerance Techniques
View Sample PDF
Author(s): Wenbing Zhao (Cleveland State University, USA)
Copyright: 2018
Pages: 10
Source title: Encyclopedia of Information Science and Technology, Fourth Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-2255-3.ch427


View Intrusion Tolerance Techniques on the publisher's website for pricing and purchasing information.


We believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such services is high, considering their essential roles in everyday operations of businesses and individuals as well. The impact of service unavailability and security breaches will only be more serious. In this chapter, we will survey the state of the art techniques for building intrusion tolerant systems. We will also illustrate a few most urgent open issues for future research. Finally, we point out that to build secure and dependable systems, we need a concerted effort in intrusion prevention, intrusion detection, and intrusion tolerance.

Related Content

Yair Wiseman. © 2021. 11 pages.
Mário Pereira Véstias. © 2021. 15 pages.
Mahfuzulhoq Chowdhury, Martin Maier. © 2021. 15 pages.
Gen'ichi Yasuda. © 2021. 12 pages.
Alba J. Jerónimo, María P. Barrera, Manuel F. Caro, Adán A. Gómez. © 2021. 19 pages.
Gregor Donaj, Mirjam Sepesy Maučec. © 2021. 14 pages.
Udit Singhania, B. K. Tripathy. © 2021. 11 pages.
Body Bottom