Modeling SITAR System Security
نویسندگان
چکیده
Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several research efforts are currently afoot to design such systems, such as Enclaves, EMERALDS, ITUA, MAFTIA and SITAR. Before any security mechanism can be accepted to provide protection to a system, it is important to assess its efficacy. Earlier security evaluations were mainly based on a qualitative assessment, such as [1], [2]. This may not be enough to characterize intrusion tolerant systems. Recent studies to security evaluation have begun to take a quantitative approach by using probabilistic and statistical methods as in traditional reliability analysis [6], [3], [5], [4]. In this paper we apply probabilistic modeling to the SITAR system, which is an intrusion tolerant architecture developed jointly by MCNC and Duke University. We start with a continuous-time Markov model that describes the dynamic behavior of multiple intrusion tolerance strategies that exist in SITAR. In order to increase the fidelity of the model to the SITAR architecture, we found it difficult to continue with the hand construction of a CTMC, we motivate and use the stochastic reward net (SRN) model to capture the SITAR system behavior as well as the attacker behavior.
منابع مشابه
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate securit...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملModeling and Quantification of Security Attributes of Software Systems
Quite often failures in network based services and server systems may not be accidental, but rather caused by deliberate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning despite security attacks. Not only is it important to prevent or tolerate security intrusions, it i...
متن کاملSITAR: GUI Test Script Repair
System testing of a GUI-based application requires that test cases, consisting of sequences of user actions/events, be executed and the software’s output be verified. To enable automated re-testing, such test cases are increasingly being coded as low-level test scripts, to be replayed automatically using test harnesses. Whenever the GUI changes—widgets get moved around, windows get merged—some ...
متن کاملIdentifying factors affecting hospital holding administration in Social Security Organization in Iran using Structural Equations Modeling
Introduction: Hospitals, major components of health system, have a high contribution to healthcare resources. Therefore, considering the importance of hospital holding in effective and efficient hospital management, the current study aimed to identify and explain the role and importance of factors affecting hospital holding administration in Iran Social Security Organization. Methods: This was...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003