𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A method for modeling and quantifying the security attributes of intrusion tolerant systems

✍ Scribed by Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi


Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
587 KB
Volume
56
Category
Article
ISSN
0166-5316

No coin nor oath required. For personal study only.

✦ Synopsis


Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with other QoS attributes such as availability and performance. This paper deals with various issues related to quantifying the security attributes of an intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intrusion tolerant system to an attack is modeled as a random process. This facilitates the use of stochastic modeling techniques to capture the attacker behavior as well as the system's response to a security intrusion. This model is used to analyze and quantify the security attributes of the system. The security quantification analysis is first carried out for steady-state behavior leading to measures like steady-state availability. By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" (MTTSF) and also compute probabilities of security failure due to violations of different security attributes.


📜 SIMILAR VOLUMES


A new method for quantifying the complex
✍ Zumwalt, Ann 📂 Article 📅 2005 🏛 John Wiley and Sons 🌐 English ⚖ 239 KB

## Abstract Muscle attachment site morphology may have valuable use for reconstructing activity patterns in individuals from historic populations or extinct species. The skeletal locations where muscles and tendons attach are morphologically very complex, and variations in this morphology may refle

FORMULAE DESCRIBING SUBJECTIVE ATTRIBUTE
✍ Y. ANDO; H. SAKAI; S. SATO 📂 Article 📅 2000 🏛 Elsevier Science 🌐 English ⚖ 403 KB

This article reviews the background of a workable model of the auditory}brain system, and formulae of calculating fundamental subjective attributes derived from the model. The model consists of the autocorrelation mechanisms, the interaural cross-correlation mechanism between the two auditory pathwa

A theoretical study of the transmutation
✍ Edmund R. Malinowski 📂 Article 📅 2002 🏛 John Wiley and Sons 🌐 English ⚖ 238 KB 👁 1 views

## Abstract Recently, a new chemometric technique called ‘transmutation’ has been designed to convert overlapping chromatographic bands into narrow bands, sufficient for resolving and quantifying the components. The ‘transmutation function’ is generated from the chromatogram of the component of int