Intrusion Tolerant System
Intrusion-tolerant systems (ITS) aim to maintain service availability despite cyberattacks, focusing on automated recovery and proactive defense. Current research emphasizes control-theoretic approaches, such as employing multi-level feedback control mechanisms to optimize resource allocation and intrusion response, and leveraging machine learning to enhance risk assessment and adaptive security configurations. This research is significant because it addresses the growing need for robust and self-managing systems capable of mitigating the increasing sophistication and frequency of cyber threats, improving overall system resilience and reducing operational costs.
Papers
April 2, 2024