A secure system architecture using a two-level approach is presented in this paper. At the node level, by means of dynamic resource reallocation within a computing node, the critical services previously selected are to survive even after the occurrence of an attack. If it becomes impossible to find enough resources for the services within the node in spite of the adaptive actions taken at the node level, it moves to the system level. The system level mechanism is to deliver the intended services transparently to the clients even when a node fails by means of inter-node resource reallocation. An architecture adopting diverse redundant computing nodes is proposed for that purpose. Through the experiments on a test-bed, especially, for web services, the approach turned out very effective to cope with not only denial of service attacks but also confidentiality and integrity attacks. © Springer-Verlag 2004.
CITATION STYLE
Min, B. J., Kim, S. K., & Choi, J. S. (2004). Secure system architecture based on dynamic resource reallocation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2908, 174–187. https://doi.org/10.1007/978-3-540-24591-9_14
Mendeley helps you to discover research relevant for your work.