{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:06:52Z","timestamp":1742378812459},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_14","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T15:33:06Z","timestamp":1277825586000},"page":"158-178","source":"Crossref","is-referenced-by-count":12,"title":["An Architecture for an Adaptive Intrusion-Tolerant Server"],"prefix":"10.1007","author":[{"given":"Alfonso","family":"Valdes","sequence":"first","affiliation":[]},{"given":"Magnus","family":"Almgren","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Deswarte","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Dutertre","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Hassen","family":"Sa\u00efdi","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Stavridou","sequence":"additional","affiliation":[]},{"given":"Tom\u00e1s E.","family":"Uribe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-45474-8_2","volume-title":"Recent Advances in Intrusion Detection","author":"M. Almgren","year":"2001","unstructured":"Almgren, M., Lindqvist, U.: Application-integrated data collection for security monitoring. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 22\u201336. Springer, Heidelberg (2001)"},{"key":"14_CR2","unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. 7th USENIX Security Conference, January 1998, pp. 63\u201378 (1998)"},{"key":"14_CR3","unstructured":"Cukier, M., Lyons, J., Pandey, P., Ramasamy, H.V., Sanders, W.H., Pal, P., Webber, F., Schantz, R., Loyall, J., Watro, R., Atighetchi, M., Gossett, J.: Intrusion tolerance approaches in ITUA. In: Fast Abstract Supplement of the 2001 Intl. Conf. on Dependable Systems and Networks, July 2001, pp. B\u201364, B\u201365 (2001)"},{"key":"14_CR4","first-page":"245","volume-title":"17th IEEE Symposium on Reliable Distributed Systems (SDRS-17)","author":"M. Cukier","year":"1998","unstructured":"Cukier, M., Ren, J., Sabnis, C., Henke, D., Pistole, J., Sanders, W.H., Bakken, D.E., Berman, M.E., Karr, D.A., Schantz, R.: AQuA: an adaptive architecture that provides dependable distributed objects. In: 17th IEEE Symposium on Reliable Distributed Systems (SDRS-17), October 1998, pp. 245\u2013253. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"14_CR5","unstructured":"Curry, D., Debar, H.: Intrusion detection message exchange format: Data model and extensible markup language (XML) document type definition (November 2001) (work in progress)"},{"key":"14_CR6","first-page":"110","volume-title":"Proc. Intl. Symposium on Security and Privacy","author":"Y. Deswarte","year":"1991","unstructured":"Deswarte, Y., Blain, L., Fabre, J.-C.: Intrusion tolerance in distributed computing systems. In: Proc. Intl. Symposium on Security and Privacy, May 1991, pp. 110\u2013121. IEEE press, Los Alamitos (1991)"},{"key":"14_CR7","first-page":"200","volume-title":"18th International Symposium on Fault-Tolerant Computing (FTCS-18)","author":"J.-C. Fabre","year":"1988","unstructured":"Fabre, J.-C., Deswarte, Y., Laprie, J.-C., Powell, D.: Saturation: Reduced idleness for improved fault-tolerance. In: 18th International Symposium on Fault-Tolerant Computing (FTCS-18), pp. 200\u2013205. IEEE Computer Society Press, Los Alamitos (1988)"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/12.656088","volume":"47","author":"J.-C. Fabre","year":"1998","unstructured":"Fabre, J.-C., P\u00e9rennou, T.: A metaobject architecture for fault-tolerant distributed systems: The FRIENDS approach. IEEE Transactions on Computers\u00a047, 78\u201395 (1998)","journal-title":"IEEE Transactions on Computers"},{"key":"14_CR9","volume-title":"18th IEEE Real-Time Systems Symposium (RTSS 1997)","author":"O. Gonzalez","year":"1997","unstructured":"Gonzalez, O., Shrikumar, H., Stankovic, J., Ramamritham, K.: Adaptive fault tolerance and graceful degradation under dynamic hard real-time scheduling. In: 18th IEEE Real-Time Systems Symposium (RTSS 1997). IEEE Computer Society Press, Los Alamitos (December 1997)"},{"key":"14_CR10","volume-title":"Design and Validation of Computer Protocols","author":"G.J. Holzmann","year":"1991","unstructured":"Holzmann, G.J.: Design and Validation of Computer Protocols. Prentice Hall, Engelwood Cliffs (1991)"},{"key":"14_CR11","first-page":"381","volume-title":"25th Symposium on Fault Tolerant Computing","author":"Y. Huang","year":"1995","unstructured":"Huang, Y., Kintala, C., Kolettis, N., Fulton, N.: Software rejuvenation: Analysis, module and applications. In: 25th Symposium on Fault Tolerant Computing, June 1995, pp. 381\u2013390. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"14_CR12","unstructured":"Real Secure server sensor policy guide version 6.0 (May 2001), \n                  \n                    http:\/\/www.iss.net"},{"key":"14_CR13","unstructured":"Just, J.E., Reynolds, J.C.: HACQIT (Hierarchical Adaptive Control of QoS for Intrusion Tolerance). In: 17th Annual Computer Security Applications Conference (2001)"},{"key":"14_CR14","first-page":"146","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"U. Lindqvist","year":"1999","unstructured":"Lindqvist, U., Porras, P.: Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 146\u2013161. IEEE press, Los Alamitos (1999)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Porras, P.: eXpert-BSM: A host-based intrusion detection solution for Sun Solaris. In: Proc. of the 17th Annual Computer Security Applications Conference (December 2001)","DOI":"10.1109\/ACSAC.2001.991540"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for intrusion tolerance. In: Proc. 14th IEEE Computer Security Foundations Workshop, June 2001, pp. 191\u2013205 (2001)","DOI":"10.1109\/CSFW.2001.930146"},{"key":"14_CR17","unstructured":"Permeh, R., Maiffret, M.: ida Code Red worm. Security Advisory AL20010717, eEye Digital Security (July 2001), \n                  \n                    http:\/\/www.eeye.com\/html\/Research\/Advisories\/AL20010717.html"},{"key":"14_CR18","unstructured":"Porras, P.: Mission-based correlation. Personal communication, SRI International (2001), \n                  \n                    http:\/\/www.sdl.sri.com\/projects\/M-correlation"},{"key":"14_CR19","unstructured":"Porras, P., Neumann, P.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: National Information Security Conference (October 1997)"},{"key":"14_CR20","unstructured":"Porras, P., Valdes, A.: Live traffic analysis of TCP\/IP gateways. In: Proc. Symposium on Network and Distributed System Security. Internet Society (March 1998)"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/71.774908","volume":"10","author":"D. Powell","year":"1999","unstructured":"Powell, D., Arlat, J., Beus-Dukic, L., Bondavalli, A., Coppola, P., Fantechi, A., Jenn, E., Rab\u00e9jac, C., Wellings, A.: GUARDS: A generic upgradable architecture for realtime dependable systems. IEEE Transactions on Parallel and Distributed Systems\u00a010, 580\u2013599 (1999)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"14_CR22","first-page":"246","volume-title":"Proc. 18 Int. Symp. on Fault-Tolerant Computing Systems (FTCS-18)","author":"D. Powell","year":"1988","unstructured":"Powell, D., Bonn, G., Seaton, D., Ver\u00edssimo, P., Waeselynck, F.: The Delta-4 approach to dependability in open distributed computing systems. In: Proc. 18 Int. Symp. on Fault-Tolerant Computing Systems (FTCS-18), June 1988, pp. 246\u2013251. IEEE Computer Society Press, Los Alamitos (1988)"},{"key":"14_CR23","first-page":"184","volume-title":"DARPA Information Survivability Conference and Exposition II","author":"G.R. Ranger","year":"2001","unstructured":"Ranger, G.R., Khosla, P.K., Bakkaloglu, M., Bigrigg, M.W., Goodson, G.R., Oguz, S., Pandurangan, V., Soules, C.A.N., Strunk, J.D., Wylie, J.J.: Survivable storage systems. In: DARPA Information Survivability Conference and Exposition II, June 2001, pp. 184\u2013195. IEEE Computer Society, Los Alamitos (2001)"},{"key":"14_CR24","unstructured":"Rivest, R.: The MD5 message digest algorithm. Internet Engineering Task Force, RFC1321 (April992)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Rodrigues, L., Verissimo, P.: xAMp: a multi-primitive group communications service. In: 11th Symposium on Reliable Distributed Systems, October 1992, pp. 112\u2013121 (1992)","DOI":"10.1109\/RELDIS.1992.235136"},{"key":"14_CR26","unstructured":"Roesch, M.: Snort: Lightweight intrusion detection for networks. In: USENIX LISA (1999) (November 1999), \n                  \n                    http:\/\/www.snort.org"},{"issue":"1","key":"14_CR27","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"Information and System Security"},{"key":"14_CR28","unstructured":"Tripwire white papers (2001), \n                  \n                    http:\/\/www.tripwire.com"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-39945-3_6","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2000","unstructured":"Valdes, A., Skinner, K.: Adaptive, model-based monitoring for cyber attack detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 80\u201392. Springer, Heidelberg (2000)"},{"key":"14_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45474-8_4","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2001","unstructured":"Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 54\u201368. Springer, Heidelberg (2001)"},{"key":"14_CR31","volume-title":"DISCEX 2000","author":"G. Vigna","year":"2000","unstructured":"Vigna, G., Eckmann, S., Kemmerer, R.: The STAT tool suite. In: DISCEX 2000. IEEE press, Los Alamitos (January 2000)"},{"key":"14_CR32","unstructured":"Wang, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K., Jou, F.: SITAR: a scalable intrusion tolerance architecture for distributed server. In: Second IEEE SMC Information Assurance Workshop (2001)"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1109\/PROC.1978.11114","volume":"66","author":"J. Wensley","year":"1978","unstructured":"Wensley, J., Lamport, L., Goldberg, J., Green, M., Levitt, K., Melliar-Smith, P., Shostack, R., Weinstock, C.: SIFT: the design and analysis of a fault-tolerant computer for aircraft control. Proc. IEEE\u00a066, 1240\u20131255 (1978)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T02:03:17Z","timestamp":1552615397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}