Survey on Intrusion Tolerant Systems in Emerging Technologies
The wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to atta...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2024-01-01
|
Series: | ITM Web of Conferences |
Subjects: | |
Online Access: | https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdf |
_version_ | 1797343593932783616 |
---|---|
author | Sanoussi Nouhad Orhanou Ghizlane |
author_facet | Sanoussi Nouhad Orhanou Ghizlane |
author_sort | Sanoussi Nouhad |
collection | DOAJ |
description | The wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to attacks. Security is therefore essential to ensure the confidentiality, integrity, and availability of system data and services. As the attacks get more sophisticated, the protection gets more difficult. In fact, mechanisms such as Firewalls, IDSs, and IPSs are still ineffective against unknown attacks. Consequently, defense-in-depth security should include intrusion tolerance. The concern of intrusion tolerance is not how to defend or detect the intrusion, but how to mask or restrain the intrusion when the network has been intruded. Using three separate lines of approaches: Detection-Triggered, Algorithm-Driven, and Recovery Based, this paper will present, analyze, and contrast several works in two different environments: Cloud Computing and Software Defined Networks (SDNs), to proceed towards Intrusion Tolerant Systems (ITSs). |
first_indexed | 2024-03-08T10:50:02Z |
format | Article |
id | doaj.art-18f53d7e15b349aeb884e8c8ea046303 |
institution | Directory Open Access Journal |
issn | 2271-2097 |
language | English |
last_indexed | 2024-03-08T10:50:02Z |
publishDate | 2024-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | ITM Web of Conferences |
spelling | doaj.art-18f53d7e15b349aeb884e8c8ea0463032024-01-26T16:48:02ZengEDP SciencesITM Web of Conferences2271-20972024-01-01600001110.1051/itmconf/20246000011itmconf_aiss2024_00011Survey on Intrusion Tolerant Systems in Emerging TechnologiesSanoussi Nouhad0Orhanou Ghizlane1Laboratory of Mathematics, Computing and Applications Information Security, Faculty of Sciences, Mohammed V University inLaboratory of Mathematics, Computing and Applications Information Security, Faculty of Sciences, Mohammed V University inThe wide spread of the Internet leads to the expansion of networks and the increase of data. For this reason, the use of emerging technologies became a necessity to cover the needs and the lapses in traditional systems. However, these systems might reveal security flaws and become vulnerable to attacks. Security is therefore essential to ensure the confidentiality, integrity, and availability of system data and services. As the attacks get more sophisticated, the protection gets more difficult. In fact, mechanisms such as Firewalls, IDSs, and IPSs are still ineffective against unknown attacks. Consequently, defense-in-depth security should include intrusion tolerance. The concern of intrusion tolerance is not how to defend or detect the intrusion, but how to mask or restrain the intrusion when the network has been intruded. Using three separate lines of approaches: Detection-Triggered, Algorithm-Driven, and Recovery Based, this paper will present, analyze, and contrast several works in two different environments: Cloud Computing and Software Defined Networks (SDNs), to proceed towards Intrusion Tolerant Systems (ITSs).https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdfintrusion tolerancedetection-triggeredrecovery-basedalgorithm-drivensdncloud computing. |
spellingShingle | Sanoussi Nouhad Orhanou Ghizlane Survey on Intrusion Tolerant Systems in Emerging Technologies ITM Web of Conferences intrusion tolerance detection-triggered recovery-based algorithm-driven sdn cloud computing. |
title | Survey on Intrusion Tolerant Systems in Emerging Technologies |
title_full | Survey on Intrusion Tolerant Systems in Emerging Technologies |
title_fullStr | Survey on Intrusion Tolerant Systems in Emerging Technologies |
title_full_unstemmed | Survey on Intrusion Tolerant Systems in Emerging Technologies |
title_short | Survey on Intrusion Tolerant Systems in Emerging Technologies |
title_sort | survey on intrusion tolerant systems in emerging technologies |
topic | intrusion tolerance detection-triggered recovery-based algorithm-driven sdn cloud computing. |
url | https://www.itm-conferences.org/articles/itmconf/pdf/2024/03/itmconf_aiss2024_00011.pdf |
work_keys_str_mv | AT sanoussinouhad surveyonintrusiontolerantsystemsinemergingtechnologies AT orhanoughizlane surveyonintrusiontolerantsystemsinemergingtechnologies |