Intrusion Masking Project

Overview

Existing intrusion tolerance or attack response mechanisms are heavily dependent on the accuracy and timeliness of intrusion detection, and the intrusion detector is believed to be a key component that every survivable system must have. In this research, we try to develop good survivable systems that are not dependent on intrusion detection, or have much less dependence on intrusion detection (compared with existing survivable systems).

In particular, we focus on both perfect and imperfect attack masking techniques where redundancy is smartly used to mask intrusions.

Papers 

People