Modeling and quantification of security attributes of software systems

被引:80
|
作者
Madan, BB [1 ]
Goseva-Popstojanova, K [1 ]
Vaidyanathan, K [1 ]
Trivedi, KS [1 ]
机构
[1] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
关键词
D O I
10.1109/DSN.2002.1028941
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quite often failures in network based services and server systems may not be accidental, but rather caused by deliberate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning despite security attacks. Not only is it important to prevent or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with, if not more important than other QoS attributes such as availability and perk formability. This paper deals with various issues related to quantifying the security attribute of at? intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intrusion tolerant system to the attack is modeled as a random process. This facilitates the use of stochastic modeling techniques to capture the attacker behavior as well as the system's response to a security intrusion. This model is used to analyze and quantify the security attributes of the system. The security quantification analysis is first carried out for steady-state behavior leading to measures like steady-state availability. By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" and also compute probabilities of security failure due to violations of different security attributes.
引用
收藏
页码:505 / 514
页数:10
相关论文
共 50 条
  • [1] A method for modeling and quantifying the security attributes of intrusion tolerant systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    PERFORMANCE EVALUATION, 2004, 56 (1-4) : 167 - 186
  • [2] A Method for Modeling and Analyzing the Security Attributes of Service-Oriented Software System
    Liu Li
    Wang Chunlei
    Ming Liang
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012,
  • [3] MODELING LESSONS FROM VERIFYING LARGE SOFTWARE SYSTEMS FOR SAFETY AND SECURITY
    Kothari, Suresh
    Awadhutkar, Payas
    Tamrawi, Ahmed
    Mathews, Jon
    2017 WINTER SIMULATION CONFERENCE (WSC), 2017, : 1431 - 1442
  • [4] Intrusion Process Modeling for Security Quantification
    Almasizadeh, Jaafar
    Azgomi, Mohammad Abdollahi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 114 - 121
  • [5] Prospects for Software Security Growth Modeling
    Daughtrey, Taz
    2014 60TH ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS), 2014,
  • [6] Development of iMACOQR Metrics Framework for Quantification of Software Security
    Banerjee, Arpita
    Banerjee, C.
    Pandey, Santosh K.
    Poonia, Ajeet Singh
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 711 - 719
  • [7] Security attributes analysis for intrusion tolerant systems
    Yin, Li-Hua
    Fang, Bin-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512
  • [8] STATISTICAL ANALYSIS OF SECURITY ATTRIBUTES OF COMPUTER SYSTEMS
    Jozwiak, Ireneusz J.
    Laskowski, Wojciech
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY & SAFETY ENGINEERING, 2007, 14 (06): : 569 - 577
  • [9] Modeling systems with software
    Browne, J
    MICROWAVES & RF, 2003, 42 (02) : 17 - 17
  • [10] Security modeling and quantification of intrusion tolerant systems using attack-response graph
    Madan, BB
    Trivedi, KS
    JOURNAL OF HIGH SPEED NETWORKS, 2004, 13 (04) : 297 - 308