000
| 02719cam 2200373zi 4500 |
---|
001 | 9.880288 |
---|
003 | CaOODSP |
---|
005 | 20221107165735 |
---|
006 | m o d f |
---|
007 | cr cn||||||||| |
---|
008 | 191007t20122012quca ob f000 0 eng d |
---|
040 | |aCaOODSP|beng|erda|cCaOODSP |
---|
041 | 0 |aeng|beng|bfre |
---|
086 | 1 |aD68-6/287-2012E-PDF |
---|
100 | 1 |aGherbi, Abdelouahed, |eauthor. |
---|
245 | 10|aRedundancy with diversity-based software architectures for the detection and tolerance of cyber-attacks : |bstate-of-the-art / |cAbdelouahed Gherbi, Robert Charpentier, Mario Couture, DRDC Valcartier. |
---|
264 | 1|aQuebec, Canada : |bDefence Research and Development Canada - Valcartier, |c2012. |
---|
264 | 4|c©2012 |
---|
300 | |a1 online resource (xii, 64 pages, 2 unnumbered pages) : |billustrations (some colour). |
---|
336 | |atext|btxt|2rdacontent |
---|
337 | |acomputer|bc|2rdamedia |
---|
338 | |aonline resource|bcr|2rdacarrier |
---|
490 | 1 |aTechnical memorandum ; |vDRDC Valcartier TM 2010-287 |
---|
500 | |a"February 2012." |
---|
504 | |aIncludes bibliographical references (pages 49-57). |
---|
520 | 3 |a"Software systems security remains a critical issue. This is evidenced by the ever increasing number and sophistication of cyber-attacks. This situation is the result of the combination of several factors. The software-based functionality of these systems is increasingly complex. The systems are often connected through open networks such as the Internet, which is increasingly accessible to potentially malicious users. Finally, these systems run software which is substantially similar. This is called IT monoculture. The mitigation against this issue requires implementation of the principle of diversity. The principle of diversity aims to reduce the common vulnerability in software and, in turn, increase the difficulty of violating the security of the systems that use diversity. The objective of this document is to present the state of the art in terms of approaches which use diversity for security purposes. Three different approaches can be distinguished: automated diversity, diversity-based behavior monitoring and diversity-based intrusion tolerance"--Abstract, page i. |
---|
546 | |aIncludes abstracts and summaries in English and French. |
---|
692 | 07|2gccst|aComputer security |
---|
700 | 1 |aCharpentier, Robert, |eauthor. |
---|
700 | 1 |aCouture, Mario, |eauthor. |
---|
710 | 1 |aCanada. |bDefence R&D Canada. |
---|
710 | 2 |aDefence R&D Canada - Valcartier. |
---|
830 | #0|aTechnical memorandum (Defence R&D Canada)|vDRDC Valcartier TM 2010-287.|w(CaOODSP)9.820564 |
---|
856 | 40|qPDF|s52.31 MB|uhttps://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-6-287-2012-eng.pdf |
---|