Security Evaluation of Layered Intrusion Tolerant Systems

被引:0
|
作者
Razavi, Sanaz Hafezian [1 ]
Das, Olivia [1 ]
机构
[1] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON, Canada
关键词
Security; Modeling; Layered Architecture; Intrusion Tolerance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper constructs a stochastic model of a layered system to analyze its security measures. It discusses evaluation of availability and integrity as two major security properties of a three-layered Architecture consisting of Client, Web-server, and Database. Using Mobius software, this study models the change in vulnerability of a layer owing to an intrusion in another layer. Furthermore, it analyzes the impact on the security of the upper layers due to an intrusion in a lower layer. While maintaining a system availability of 97.73%, this study indicates that increasing the host attack rate in the Database layer from 10 to 20 will reduce system availability to 97.55%. Similar modification made to a Web-server layer will contribute to 97.04% availability. This set of results imply that increasing the attack rate in Web Server layer has a more severe impact on system availability, as compared to the Database layer. Similar results have been gathered when predicting integrity of the system under identical set of modification. At system integrity of 96.88%, increasing host attack rate in Database layer has resulted in achieving integrity of 96.68%; similar experiment for Web server layer resulted in system integrity of 96.57%.
引用
收藏
页码:145 / 158
页数:14
相关论文
共 50 条
  • [31] Security Evaluation of Two Intrusion Detection Systems in Smart Grid SCADA Environment
    Singh, Vivek Kumar
    Ebrahem, Haythem
    Govindarasu, Manimaran
    2018 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2018,
  • [32] A Security Metric for the Evaluation of Collaborative Intrusion Detection Systems in Wireless Sensor Networks
    Ramos, Alex
    Lazar, Marcella
    Holanda Filho, Raimir
    Rodrigues, Joel J. P. C.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [33] Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 156 - 163
  • [34] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [35] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [36] A game theoretic approach based on intrusion tolerant systems
    Sanoussi, Nouhad
    Orhanou, Ghizlane
    El Hajji, Said
    International Journal of Security and Networks, 2020, 15 (03): : 175 - 181
  • [37] A framework for intrusion tolerant certification authority system evaluation
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2007, : 231 - +
  • [38] Foundations of intrusion tolerant systems, OASIS 2003: Introduction
    Lala, Jaynarayan H.
    Foundations of Intrusion Tolerant Systems, OASIS 2003, 2003,
  • [39] Analysis of techniques for building intrusion tolerant server systems
    Wang, FY
    Uppalli, R
    Killian, C
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 729 - 734
  • [40] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841