Security Evaluation of Layered Intrusion Tolerant Systems

被引:0
|
作者
Razavi, Sanaz Hafezian [1 ]
Das, Olivia [1 ]
机构
[1] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
关键词
Security; Modeling; Layered Architecture; Intrusion Tolerance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper constructs a stochastic model of a layered system to analyze its security measures. It discusses evaluation of availability and integrity as two major security properties of a three-layered Architecture consisting of Client, Web-server, and Database. Using Mobius software, this study models the change in vulnerability of a layer owing to an intrusion in another layer. Furthermore, it analyzes the impact on the security of the upper layers due to an intrusion in a lower layer. While maintaining a system availability of 97.73%, this study indicates that increasing the host attack rate in the Database layer from 10 to 20 will reduce system availability to 97.55%. Similar modification made to a Web-server layer will contribute to 97.04% availability. This set of results imply that increasing the attack rate in Web Server layer has a more severe impact on system availability, as compared to the Database layer. Similar results have been gathered when predicting integrity of the system under identical set of modification. At system integrity of 96.88%, increasing host attack rate in Database layer has resulted in achieving integrity of 96.68%; similar experiment for Web server layer resulted in system integrity of 96.57%.
引用
收藏
页码:145 / 158
页数:14
相关论文
共 50 条
  • [1] Quantitative Security Evaluation of Intrusion Tolerant Systems With Markovian Arrivals
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    Trivedi, Kishor S.
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (02) : 547 - 562
  • [2] Security Evaluation of an Intrusion Tolerant System with MRSPNs
    Fujimoto, Ryutaro
    Okamura, Hiroyuki
    Dohi, Tadashi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 427 - 432
  • [3] Security attributes analysis for intrusion tolerant systems
    Yin, Li-Hua
    Fang, Bin-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512
  • [4] A method for modeling and quantifying the security attributes of intrusion tolerant systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    PERFORMANCE EVALUATION, 2004, 56 (1-4) : 167 - 186
  • [5] Intrusion tolerant systems
    Lala, JH
    2000 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2000, : 3 - 3
  • [6] Security analysis model of intrusion tolerant systems based on game theory
    Zhou, Hua
    Zhou, Hai-Jun
    Ma, Jian-Feng
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (08): : 1933 - 1939
  • [7] Intrusion tolerant IT security for NAS architecture
    Reilly, ME
    Kelleher, P
    FALL 2000 45TH ANNUAL AIR TRAFFIC CONTROL ASSOCIATION CONFERENCE PROCEEDINGS, 2000, : 110 - 115
  • [8] Layered Security Framework for Intrusion Prevention
    Nalavade, Kamini
    Meshram, B. B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 253 - 259
  • [9] Cyber Security Analysis and Evaluation for Intrusion Detection Systems
    Abushark, Yoosef B.
    Khan, Asif Irshad
    Alsolami, Fawaz
    Almalawi, Abdulmohsen
    Alam, Md Mottahir
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1765 - 1783
  • [10] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133