Modeling and Evaluation of Intrusion Tolerant Systems Based on Dynamic Diversity Backups

نویسندگان

  • Kun Meng
  • Chuang Lin
  • YuanZhuo Wang
  • Yang Yang
چکیده

Based on the technology of dynamic diversity backups, an intrusion tolerant system is proposed which guarantees the performance of the system and does not degrade drastically when it is exposed to outside attacks. By analyzing the consequence of the attacks, we give the attack model and model of the proposed intrusion tolerant system by General Stochastic Petri Net (GSPN). Through it, we can evaluate the efficiency of the intrusion tolerant system (ITS) based on the dynamic diversity backups. In the end of the paper, we analyze the proposed system with three diversity backups and random schedule strategy among the backups by the tool SPNP (Stochastic Petri Net package). The results show that the ITS is affected lightly under the heave attacks, which implies that the system can defend most intrusion effectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling SITAR System Security

Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several res...

متن کامل

Evaluating Intrusion-Tolerant Certification Authority Systems

Various intrusion-tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion-tolerant CA system evaluation, ...

متن کامل

Marketing Strategy Evaluation by Integrating Dynamic Systems Modeling and Network Data Envelopment Analysis

Nowadays, the service industries play an essential role in the economic development of countries, and among the various fields of insurance, life insurance is of particular importance because it covers its cover directly to humans. Increased competition in the insurance industry has led managers to seek marketing strategies that, in addition to increasing insurance sales, reduce costs and gain ...

متن کامل

A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders

Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...

متن کامل

How Practical are Intrusion-Tolerant Distributed Systems?

Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009