Probabilistic validation of an intrusion-tolerant replication system

被引:29
|
作者
Singh, S [1 ]
Cukier, M [1 ]
Sanders, WH [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
关键词
D O I
10.1109/DSN.2003.1209971
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As computer systems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders. Intrusion tolerance is an emerging approach that aims to enable systems to continue functioning in spite of successful intrusions. Before intrusion tolerance is accepted! as an approach to security, there must be quantitative techniques to measure its, efficacy. However, there have been very few attempts at quantitative validation of intrusion-tolerant systems or, for that matter, of security in general. In this paper, we show that probabilistic validation through stochastic modeling is an attractive mechanism for evaluating intrusion tolerance. We demonstrate our approach by using stochastic activity networks to quantitativily validate an intrusion-tolerant replication management system. We characterize the intrusion tolerance provided, by the system through several measures defined on the model, and study variations in these measures in response to changes in system parameters to evaluate the relative merits of various design choices.
引用
收藏
页码:615 / 624
页数:10
相关论文
共 50 条
  • [1] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [2] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [3] A survey on intrusion-tolerant system
    Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
  • [4] Model-based validation of an intrusion-tolerant information system
    Stevens, F
    Courtney, T
    Singh, S
    Agbaria, A
    Meyer, JF
    Sanders, WH
    Pal, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194
  • [5] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [6] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [7] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31
  • [8] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [9] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [10] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893