Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management

被引:4
|
作者
Zheng, Junjun [1 ]
Okamura, Hiroyuki [2 ]
Dohi, Tadashi [2 ]
机构
[1] Ritsumeikan Univ, Dept Informat Sci & Engn, Kusatsu 5258577, Japan
[2] Hiroshima Univ, Dept Informat Engn, Higashihiroshima 7398527, Japan
关键词
security patch; intrusion tolerance; virtual machine; interval availability; point-wise availability; stochastic reward net; Markov regenerative process; phase expansion; SOFTWARE REJUVENATION POLICIES;
D O I
10.1109/HASE.2019.00032
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Computer security has gained more and more attention in a public over the last years, since computer systems are suffering from significant and increasing security threats that cause security breaches by exploiting software vulnerabilities. The most efficient way to ensure the system security is to patch the vulnerable system before a malicious attack occurs. Besides the commonly-used push-type patch management, the pull-type patch management is also adopted. The main issues in the pull-type patch management are two-fold; when to check the vulnerability information and when to apply a patch? This paper considers the security patch management for a virtual machine (VM) based intrusion tolerant system (ITS), where the system undergoes the patch management with a periodic vulnerability checking strategy, and evaluates the system security from the availability aspect. A composite stochastic reward net (SRN) model is applied to capture the attack behavior of adversary and the defense behaviors of system. Two availability measures; interval availability and point-wise availability are formulated to quantify the system security via phase expansion. The proposed approach and metrics not only enable us to quantitatively assess the system security, but also provide insights on the patch management. In numerical experiments, we evaluate effects of the intrusion rate and the number of vulnerability checking on the system security.
引用
收藏
页码:156 / 163
页数:8
相关论文
共 35 条
  • [1] A Pull-Type Security Patch Management of an Intrusion Tolerant System under a Periodic Vulnerability Checking Strategy
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2018, : 630 - 635
  • [2] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    1600, Institute of Electrical and Electronics Engineers Inc., United States
  • [3] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
  • [4] Performance Evaluation of VM-Based Intrusion Tolerant Systems with Poisson Arrivals
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 181 - 187
  • [5] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
  • [6] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
  • [7] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
  • [8] Proactive Recovery in Intrusion-Tolerant System Based on TTCB
    Zhou Hua
    Zhou Hai-jun
    Ma Jian-feng
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
  • [9] Model-based validation of an intrusion-tolerant information system
    Stevens, F
    Courtney, T
    Singh, S
    Agbaria, A
    Meyer, JF
    Sanders, WH
    Pal, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194
  • [10] Security Evaluation of an Intrusion Tolerant System with MRSPNs
    Fujimoto, Ryutaro
    Okamura, Hiroyuki
    Dohi, Tadashi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 427 - 432