Survey on Intrusion Tolerant Systems in Emerging Technologies

The wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to atta...

Full description

Bibliographic Details
Main Authors: Sanoussi Nouhad, Orhanou Ghizlane
Format: Article
Language:English
Published: EDP Sciences 2024-01-01
Series:ITM Web of Conferences
Subjects:
Online Access:https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdf
_version_ 1797343593932783616
author Sanoussi Nouhad
Orhanou Ghizlane
author_facet Sanoussi Nouhad
Orhanou Ghizlane
author_sort Sanoussi Nouhad
collection DOAJ
description The wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to attacks. Security is therefore essential to ensure the confidentiality, integrity, and availability of system data and services. As the attacks get more sophisticated, the protection gets more difficult. In fact, mechanisms such as Firewalls, IDSs, and IPSs are still ineffective against unknown attacks. Consequently, defense-in-depth security should include intrusion tolerance. The concern of intrusion tolerance is not how to defend or detect the intrusion, but how to mask or restrain the intrusion when the network has been intruded. Using three separate lines of approaches: Detection-Triggered, Algorithm-Driven, and Recovery Based, this paper will present, analyze, and contrast several works in two different environments: Cloud Computing and Software Defined Networks (SDNs), to proceed towards Intrusion Tolerant Systems (ITSs).
first_indexed 2024-03-08T10:50:02Z
format Article
id doaj.art-18f53d7e15b349aeb884e8c8ea046303
institution Directory Open Access Journal
issn 2271-2097
language English
last_indexed 2024-03-08T10:50:02Z
publishDate 2024-01-01
publisher EDP Sciences
record_format Article
series ITM Web of Conferences
spelling doaj.art-18f53d7e15b349aeb884e8c8ea0463032024-01-26T16:48:02ZengEDP SciencesITM Web of Conferences2271-20972024-01-01600001110.1051/itmconf/20246000011itmconf_aiss2024_00011Survey on Intrusion Tolerant Systems in Emerging TechnologiesSanoussi Nouhad0Orhanou Ghizlane1Laboratory of Mathematics, Computing and Applications Information Security, Faculty of Sciences, Mohammed V University inLaboratory of Mathematics, Computing and Applications Information Security, Faculty of Sciences, Mohammed V University inThe wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to attacks. Security is therefore essential to ensure the confidentiality, integrity, and availability of system data and services. As the attacks get more sophisticated, the protection gets more difficult. In fact, mechanisms such as Firewalls, IDSs, and IPSs are still ineffective against unknown attacks. Consequently, defense-in-depth security should include intrusion tolerance. The concern of intrusion tolerance is not how to defend or detect the intrusion, but how to mask or restrain the intrusion when the network has been intruded. Using three separate lines of approaches: Detection-Triggered, Algorithm-Driven, and Recovery Based, this paper will present, analyze, and contrast several works in two different environments: Cloud Computing and Software Defined Networks (SDNs), to proceed towards Intrusion Tolerant Systems (ITSs).https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdfintrusion tolerancedetection-triggeredrecovery-basedalgorithm-drivensdncloud computing.
spellingShingle Sanoussi Nouhad
Orhanou Ghizlane
Survey on Intrusion Tolerant Systems in Emerging Technologies
ITM Web of Conferences
intrusion tolerance
detection-triggered
recovery-based
algorithm-driven
sdn
cloud computing.
title Survey on Intrusion Tolerant Systems in Emerging Technologies
title_full Survey on Intrusion Tolerant Systems in Emerging Technologies
title_fullStr Survey on Intrusion Tolerant Systems in Emerging Technologies
title_full_unstemmed Survey on Intrusion Tolerant Systems in Emerging Technologies
title_short Survey on Intrusion Tolerant Systems in Emerging Technologies
title_sort survey on intrusion tolerant systems in emerging technologies
topic intrusion tolerance
detection-triggered
recovery-based
algorithm-driven
sdn
cloud computing.
url https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdf
work_keys_str_mv AT sanoussinouhad surveyonintrusiontolerantsystemsinemergingtechnologies
AT orhanoughizlane surveyonintrusiontolerantsystemsinemergingtechnologies