Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat

نویسندگان

  • Sohail Safdar
  • Mohd. Fadzil Hassan
  • Rehan Akbar
  • Muhammad Aasim Qureshi
چکیده

The main objective of the research is to formalize an abstract architecture for the alternative data source that is meant to be used during system availability under intrusion threat. For this purpose, three possible designed semantics have been identify and considered. The security and performance parameters that are required to be exhibited by the alternative data source have been identified. Qualitative analysis is carried out in terms of the identified security and performance parameters, among the considered design semantics to select the potentially secure and suitable design semantic. The selected design semantic becomes the basis of formalizing an abstract architecture for the alternative data source during system availability under intrusion threat scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Earthen architecture, an alternative to construction industry to manage the drought crisis in Iran: Comparison between water usage in a building with three type of loading system: steel, concrete, and earth

Abstract: Iran faces water shortage crisis whilst construction industry consumes huge amount of water. There are not precise data about construction industry water consumption. Accordingly, lack of comparison as well as prioritization between prevalent structural systems and alternatives which probably use less water create problems in planning for less consumption. There are two questions whi...

متن کامل

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012