Abstract
Distributed computing systems are important in daily business processing. Since vulnerability cannot be totally removed from a distributed computing system, successful attacks always happen and may inject malicious tasks or incorrect data into the distributed system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. In this paper, based on our recovery theories and algorithms proposed in [10], we build an architecture of a distributed attack recovery system. Our work can help the user to build a real recovery system and serve as a test bed to evaluate both our attack recovery techniques and new developed attack recovery techniques in the future.
Original language | English (US) |
---|---|
Title of host publication | 2005 IEEE Networking, Sensing and Control, ICNSC2005 - Proceedings |
Pages | 999-1004 |
Number of pages | 6 |
Volume | 2005 |
DOIs | |
State | Published - 2005 |
Event | 2005 IEEE Networking, Sensing and Control, ICNSC2005 - Tucson, AZ, United States Duration: Mar 19 2005 → Mar 22 2005 |
Other
Other | 2005 IEEE Networking, Sensing and Control, ICNSC2005 |
---|---|
Country/Territory | United States |
City | Tucson, AZ |
Period | 3/19/05 → 3/22/05 |
All Science Journal Classification (ASJC) codes
- General Engineering