000 02719cam  2200373zi 4500
0019.880288
003CaOODSP
00520221107165735
006m     o  d f      
007cr cn|||||||||
008191007t20122012quca    ob   f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
0410 |aeng|beng|bfre
0861 |aD68-6/287-2012E-PDF
1001 |aGherbi, Abdelouahed, |eauthor.
24510|aRedundancy with diversity-based software architectures for the detection and tolerance of cyber-attacks : |bstate-of-the-art / |cAbdelouahed Gherbi, Robert Charpentier, Mario Couture, DRDC Valcartier.
264 1|aQuebec, Canada : |bDefence Research and Development Canada - Valcartier, |c2012.
264 4|c©2012
300 |a1 online resource (xii, 64 pages, 2 unnumbered pages) : |billustrations (some colour).
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aTechnical memorandum ; |vDRDC Valcartier TM 2010-287
500 |a"February 2012."
504 |aIncludes bibliographical references (pages 49-57).
5203 |a"Software systems security remains a critical issue. This is evidenced by the ever increasing number and sophistication of cyber-attacks. This situation is the result of the combination of several factors. The software-based functionality of these systems is increasingly complex. The systems are often connected through open networks such as the Internet, which is increasingly accessible to potentially malicious users. Finally, these systems run software which is substantially similar. This is called IT monoculture. The mitigation against this issue requires implementation of the principle of diversity. The principle of diversity aims to reduce the common vulnerability in software and, in turn, increase the difficulty of violating the security of the systems that use diversity. The objective of this document is to present the state of the art in terms of approaches which use diversity for security purposes. Three different approaches can be distinguished: automated diversity, diversity-based behavior monitoring and diversity-based intrusion tolerance"--Abstract, page i.
546 |aIncludes abstracts and summaries in English and French.
69207|2gccst|aComputer security
7001 |aCharpentier, Robert, |eauthor.
7001 |aCouture, Mario, |eauthor.
7101 |aCanada. |bDefence R&D Canada.
7102 |aDefence R&D Canada - Valcartier.
830#0|aTechnical memorandum (Defence R&D Canada)|vDRDC Valcartier TM 2010-287.|w(CaOODSP)9.820564
85640|qPDF|s52.31 MB|uhttps://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-6-287-2012-eng.pdf