登入選單
返回Google圖書搜尋
Redundancy with Diversity-based Software Architectures for the Detection and Tolerance of Cyber-attacks
註釋"Software systems security remains a critical issue. This is evidenced by the ever increasing number and sophistication of cyber-attacks. This situation is the result of the combination of several factors. The software-based functionality of these systems is increasingly complex. The systems are often connected through open networks such as the Internet, which is increasingly accessible to potentially malicious users. Finally, these systems run software which is substantially similar. This is called IT monoculture. The mitigation against this issue requires implementation of the principle of diversity. The principle of diversity aims to reduce the common vulnerability in software and, in turn, increase the difficulty of violating the security of the systems that use diversity. The objective of this document is to present the state of the art in terms of approaches which use diversity for security purposes. Three different approaches can be distinguished: automated diversity, diversity-based behavior monitoring and diversity-based intrusion tolerance"--Abstract, page i.