Development of a Monitoring Module for ITS (Intrusion Tolerant System)
Security systems need be tested on the network, when they are Recently the cyber terror has become a crucial issue of the national security over the world. Cyber terror happens to attack the critical infrastructures that might result in a malfunction of a nationwide information network. Several techniques against such cyber terror have been proposed including firewall system, intrusion detection system, virtual private network, and intrusion tolerant system (ITS). Among those ITS is the one that tries to deliver useful services even if an attacker with malicious purpose were able to intrude the system. This paper implements a monitoring module of the system security information for ITS to provide continuous services. This module monitors the information of the hardware, memory, CPU processes, network traffic and others. This information being monitored will be reported to the administrator to maintain the ITS’s services.
KeywordsIntrusion Detection Network Traffic Monitoring Module Virtual Private Network Essential Service
Unable to display preview. Download preview PDF.
- 1.Choi, C.S., Lee, K.G., Kim, H.K.: Study of Intrusion Tolerant Technology. Korea Institute of Security & Cryptology 13(1) (February 2003)Google Scholar
- 2.Hiltunen, M.A., et al.: Survivability through Customization and Adaptability: The Cactus Approach. In: DARPA Information Survivability Conference & Exposition (2000)Google Scholar
- 4.Min, B.J.: Development of Computer Security Technique. In: kisa, Symposium on Information Security (July 2002)Google Scholar
- 5.Kim, B.J., Kim, S.G.: Proposal of Scheme Relocation Resource and Server Duplicate against DoS. In: Korea Information Processing Society, vol. 10-A(1) (March 2003)Google Scholar