Intrusion Masking Project
Existing intrusion tolerance or attack response mechanisms are heavily dependent
on the accuracy and timeliness of intrusion detection, and the intrusion
detector is believed to be a key component that every survivable system must
have. In this research, we try to develop good survivable systems that
are not dependent on intrusion detection, or have much less dependence on
intrusion detection (compared with existing survivable systems).
In particular, we focus on both perfect and imperfect attack
masking techniques where redundancy is smartly used to mask intrusions.
- M. Yu,
P. Liu, W. Zhang, "A
Practical Architecture for Distributed Intrusion Masking Database Systems",
Technical Report, PSU-S2-2002-02, Penn State Cyber Security Group.
- Peng Liu (Penn State), Meng Yu (Penn State)