Modeling and Evaluation of Intrusion Tolerant Systems Based on Dynamic Diversity Backups
نویسندگان
چکیده
Based on the technology of dynamic diversity backups, an intrusion tolerant system is proposed which guarantees the performance of the system and does not degrade drastically when it is exposed to outside attacks. By analyzing the consequence of the attacks, we give the attack model and model of the proposed intrusion tolerant system by General Stochastic Petri Net (GSPN). Through it, we can evaluate the efficiency of the intrusion tolerant system (ITS) based on the dynamic diversity backups. In the end of the paper, we analyze the proposed system with three diversity backups and random schedule strategy among the backups by the tool SPNP (Stochastic Petri Net package). The results show that the ITS is affected lightly under the heave attacks, which implies that the system can defend most intrusion effectively.
منابع مشابه
Modeling SITAR System Security
Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several res...
متن کاملEvaluating Intrusion-Tolerant Certification Authority Systems
Various intrusion-tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion-tolerant CA system evaluation, ...
متن کاملMarketing Strategy Evaluation by Integrating Dynamic Systems Modeling and Network Data Envelopment Analysis
Nowadays, the service industries play an essential role in the economic development of countries, and among the various fields of insurance, life insurance is of particular importance because it covers its cover directly to humans. Increased competition in the insurance industry has led managers to seek marketing strategies that, in addition to increasing insurance sales, reduce costs and gain ...
متن کاملA Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders
Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...
متن کاملHow Practical are Intrusion-Tolerant Distributed Systems?
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009