A method for modeling and quantifying the security attributes of intrusion tolerant systems
✍ Scribed by Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 587 KB
- Volume
- 56
- Category
- Article
- ISSN
- 0166-5316
No coin nor oath required. For personal study only.
✦ Synopsis
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with other QoS attributes such as availability and performance. This paper deals with various issues related to quantifying the security attributes of an intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intrusion tolerant system to an attack is modeled as a random process. This facilitates the use of stochastic modeling techniques to capture the attacker behavior as well as the system's response to a security intrusion. This model is used to analyze and quantify the security attributes of the system. The security quantification analysis is first carried out for steady-state behavior leading to measures like steady-state availability. By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" (MTTSF) and also compute probabilities of security failure due to violations of different security attributes.
📜 SIMILAR VOLUMES
## Abstract Muscle attachment site morphology may have valuable use for reconstructing activity patterns in individuals from historic populations or extinct species. The skeletal locations where muscles and tendons attach are morphologically very complex, and variations in this morphology may refle
This article reviews the background of a workable model of the auditory}brain system, and formulae of calculating fundamental subjective attributes derived from the model. The model consists of the autocorrelation mechanisms, the interaural cross-correlation mechanism between the two auditory pathwa
## Abstract Recently, a new chemometric technique called ‘transmutation’ has been designed to convert overlapping chromatographic bands into narrow bands, sufficient for resolving and quantifying the components. The ‘transmutation function’ is generated from the chromatogram of the component of int