{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T06:13:02Z","timestamp":1694671982088},"reference-count":26,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2012,10]]},"abstract":"ABSTRACT<\/jats:title>Proactive recovery mechanism has been widely used in building intrusion\u2010tolerant systems that are able to tolerate an arbitrary number of faults. However, previous proactive recovery methods seldom consider the dynamic in attacking power that may cause the increase in fault rate, resulting unguaranteed service availability. This paper describes an approach for tolerating intrusions, or more precisely, damages to replicated data, through dynamic configuration of physical and virtual replicas, which follows a general approach called proactive recovery, and proposes to dynamically adjust recovery frequency to handle potentially changing fault rate. This dynamic proactive recovery method takes the dynamic changes of attaching power into consideration to avoid\/minimize the effect of intrusions. Our method is especially effective and useful in intrusion tolerance with physical replicas: it dynamically provides virtual replicas during rejuvenation phase. Copyright \u00a9 2012 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.423","type":"journal-article","created":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T06:27:28Z","timestamp":1333261648000},"page":"1169-1180","source":"Crossref","is-referenced-by-count":3,"title":["Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas"],"prefix":"10.1002","volume":"5","author":[{"given":"Feng","family":"Zhao","sequence":"first","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]},{"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]},{"given":"Weizhong","family":"Qiang","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]},{"given":"Qin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China"}]}],"member":"311","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"InghamK ForrestS.A history and survey of network firewalls.Technical Report TR\u2010CS\u20102002\u201037 University New Mexico 2002."},{"issue":"1","key":"e_1_2_7_3_1","first-page":"35","article-title":"Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks","volume":"1","author":"Ponomarchuk Y","year":"2010","journal-title":"Journal of Convergence"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.3"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1813654.1813655"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.169"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITCC.2011.039283"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.159"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the Nineteenth ACM symposium on Operating Systems Principles","author":"Barham P","year":"2003"},{"issue":"1","key":"e_1_2_7_11_1","first-page":"101","article-title":"Performance evaluation of convergence ad hoc networks","volume":"1","author":"Prahmkaew S","year":"2010","journal-title":"Journal of Convergence"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_7_13_1","first-page":"287","volume-title":"Proceedings of USENIX 2008 Annual Technical Conference on Annual Technical Conference","author":"Chun B\u2010G","year":"2008"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.25"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"BessaniA ReiserHP SousaP et al.FOREVER: fault\/intrusion removal through evolution & recovery. InProceedings of 9th International Middleware Conference Companion(Middleware 2008) Leuven Belgium 2008.","DOI":"10.1145\/1462735.1462763"},{"key":"e_1_2_7_17_1","unstructured":"BessaniAN ObelheiroRR SousaP GashiI.On the effects of diversity on intrusion tolerance. Department of Informatics Technical Report DI\/FCUL TR 08\u201030 University of Lisbon 2008."},{"key":"e_1_2_7_18_1","first-page":"71","volume-title":"Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems","author":"Sousa P","year":"2006"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITCC.2011.039282"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004373"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2010.2047308"},{"key":"e_1_2_7_22_1","unstructured":"GoyalV BiedermanE NellitheerthaHK.A Kexec\u2010based kernel crash dumping mechanism.Proc. of the Linux Symposium 2005;169\u2013181."},{"key":"e_1_2_7_23_1","unstructured":"AMD64 architecture programmer's manual. Volume 2: System programming"},{"key":"e_1_2_7_24_1","unstructured":"ZhouL SchneiderFB vanRenesseR.APSS: proactive secret sharing in asynchronous systems. Technical Report TR 2002\u20101877 Cornell University Ithaca New York Oct.2002."},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270333"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.6"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.423","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T23:57:14Z","timestamp":1694649434000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["10.1002\/sec.423"],"URL":"https:\/\/doi.org\/10.1002\/sec.423","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,29]]}}}