Filters








8,274 Hits in 4.6 sec

A method for modeling and quantifying the security attributes of intrusion tolerant systems

Bharat B. Madan, Katerina Goševa-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi
2004 Performance evaluation (Print)  
A security intrusion and the response of an intrusion tolerant system to an attack is modeled as a random process.  ...  This model is used to analyze and quantify the security attributes of the system.  ...  Our interest is in studying the so called 3P Q H generation intrusion tolerant systems (such as the SITAR) for quantifying their security attributes.  ... 
doi:10.1016/j.peva.2003.07.008 fatcat:7cykzwtuqffwrgvfiqbpy3ds3y

Modeling security as a dependability attribute: a refinement-based approach

Ali Mili, Frederick Sheldon, Lamia Labed Jilani, Alex Vinokurov, Alex Thomasian, Rahma Ben Ayed
2006 Innovations in Systems and Software Engineering  
In this paper, we introduce and discuss a refinement-based model for one dimension of system security, namely survivability.  ...  As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations by opening hitherto unknown vulnerabilities  ...  In this section we discuss in turn: the need for modeling security, then the need for modeling security as an attribute of dependability, and finally the adequacy of a refinement-based approach to modeling  ... 
doi:10.1007/s11334-006-0023-7 fatcat:slvw2jbzyvh3ld6h6t5mctiuf4

Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance

Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia
2016 International Journal of Security and Its Applications  
On the basis of existing model of intrusion tolerance, we putted forward an optimization of finite automata state transition model in intrusion tolerance system by adding strategy and updating status.  ...  finite automata intrusion tolerant system is feasible, effective, and has simple features.  ...  Since this method is not only makes consideration of protection to the system availability, but also considered in both system data and service's confidentiality , integrity and other security attributes  ... 
doi:10.14257/ijsia.2016.10.3.14 fatcat:x2m4muebk5ep7omo75i3beldxm

Security analysis of SITAR intrusion tolerance system

Dazhi Wang, Bharat B. Madan, Kishor S. Trivedi
2003 Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems in association with 10th ACM Conference on Computer and Communications Security - SSRS '03  
Some recent research efforts have emphasized the need for a quantitative assessment of security attributes for intrusion tolerant systems.  ...  Security is an important QoS attribute for characterizing intrusion tolerant computing systems.  ...  All the researches above show that probabilistic modeling is a feasible and an effective methods for quantifying the security for complex systems.  ... 
doi:10.1145/1036921.1036924 fatcat:72fm3wkrrbcejjb35hpbhzvwxa

Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov

Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang
2017 International Journal of Network Security  
After the occurrence of network intrusion, the system is running in a state of the lower quality.  ...  This paper developed a Markov intrusion tolerance model (SMP), aiming at difficultly evaluates and enhances the system's tolerant capacity issues.  ...  Declares: The authors declare that there is no conflict of interest regarding the publication of this manuscript.  ... 
dblp:journals/ijnsec/LuoYWSL17 fatcat:hlabvk4ot5gyxo7utdg2zvctnu

A Cloud Based Network Intrusion Detection System

Li You, Zhanyong Wang
2022 Tehnički Vjesnik  
effectiveness and timeliness of detection of the system.  ...  Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.  ...  It can be seen that all the modules of the cloud computing based intrusion detection system model are mutually reinforcing and the model can improve the timeliness and accuracy of the system in quantified  ... 
doaj:84e43984da7a4a258925c24d07f8552a fatcat:shywfuwkibdblgrzmmyo7uuk5u

Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery

Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang
2018 International Journal of Network Security  
The semi-Markov process of discrete time is used to model the system. The security of the system is analyzed and evaluated quantitatively from a number of perspectives such as time and space.  ...  Some new indicators are proposed to evaluate the security performance of the intrusion tolerance system more comprehensively and appropriately. We present the methods how to calculate the indicators.  ...  Acknowledgments This work was supported in part by the National Natural Science Foundation of China under Grant 61472139 and a research Grant made to East China University of Science and Technology by  ... 
dblp:journals/ijnsec/HuangCLF18 fatcat:676mgdwp6jch7i2kjrphudeznm

Fuzzy Rough Classification Models for Network Intrusion Detection

Ashalata Panigrah, Manas Ranjan Patra
2016 Transactions on Machine Learning and Artificial Intelligence  
Our approach comprises of two phases; in the first phase the most relevant features are extracted using a set of rank and search based methods; and in the second phase we classify the reduced dataset as  ...  Building an intrusion detection system is a complex and challenging task.  ...  Given the set of conditional attributes A, the fuzzy tolerance relation R is defined by R(x,y) = min Ra (x,y) (10) a Є A in which Ra (x,y) is the degree to which objects x and y are similar for attribute  ... 
doi:10.14738/tmlai.42.1882 fatcat:brhs3q2sxjbqbexhan3r54bn2i

An integrated framework for security and dependability

Erland Jonsson
1998 Proceedings of the 1998 workshop on New security paradigms - NSPW '98  
Thus, a system-related conceptual model is suggested in which the various aspects of security and dependability are analyzed and regrouped into a new "input-output"-related system model.  ...  One of the benefits of the model is that it can form a basis for composite measures of security and dependability. Thus, it is possible to define preventive measures and behavioural measures.  ...  This index is calculated by means of using Markov chains and its aim is to quantify the total security aspect of an intrusion-tolerant system.  ... 
doi:10.1145/310889.310903 dblp:conf/nspw/Jonsson98 fatcat:ndp5evz4evcb7ag34uuy2rjioy

Model-based evaluation: from dependability to security

D.M. Nicol, W.H. Sanders, K.S. Trivedi
2004 IEEE Transactions on Dependable and Secure Computing  
The development of techniques for quantitative, model-based evaluation of computer system dependability has a long and rich history.  ...  Alone, neither of these approaches is fully satisfactory, and we argue that there is much to be gained through the development of a sound model-based methodology for quantifying the security one can expect  ...  ACKNOWLEDGMENT We would like to thank our past and current research sponsors for supporting this work, and our colleagues and students, both past and present, who also contributed to the research described  ... 
doi:10.1109/tdsc.2004.11 fatcat:nli5cwcxrbfchkzhvojdttwpym

A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability

M. Al-Kuwaiti, N. Kyriakopoulos, S. Hussein
2009 IEEE Communications Surveys and Tutorials  
This paper presents a systematic approach for determining common and complementary characteristics of five widely-used concepts, dependability, fault-tolerance, reliability, security, and survivability  ...  The approach consists of comparing definitions, attributes, and evaluation measures for each of the five concepts and developing corresponding relations.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the manuscript reviewers who provided them with their valuable feedbacks and comments.  ... 
doi:10.1109/surv.2009.090208 fatcat:yk35zwskr5eehjpcohny4ww6pi

Optimal Security Patch Management Policies Maximizing System Availability

Toshikazu Uemura, Tadashi Dohi
2010 Journal of Communications  
redundancy is a low-cost security tolerance technique and security attributes.  ...  Dohi, “Optimizing security measures attributes of software systems,”, Proceedings of 32nd An- in an intrusion tolerant database system,” ISAS 2008 (T.  ... 
doi:10.4304/jcm.5.1.71-80 fatcat:a5c5zaoa6bfp7luv7xiraay2ou

Highly Available Smart Grid Control Centers through Intrusion Tolerance [article]

Maryam Tanha, Fazirulhisyam Hashima, S. Shamalab, Khairulmizam Samsudin
2012 arXiv   pre-print
Intrusion tolerance proves a promising security approach against malicious attacks and contributes to enhance the resilience and security of the key components of smart grid, mainly SCADA and control centers  ...  Hence, an intrusion tolerant system architecture for smart grid control centers is proposed in this paper.  ...  MTTSF Formulation and Analysis Analogous to the Mean Time To Failure (MTTF) as a quantitative reliability measure, MTTSF is a measure for quantifying the security of intrusion tolerant systems [51] .  ... 
arXiv:1209.6228v1 fatcat:to4xtgyoxzartl4sjau3nasnrq

Enhancing the Capability of IDS using Fuzzy Rough Classifier with Genetic Search Feature Reduction
English

Ashalata Panigrahi, Manas Ranjan Patra
2014 Transactions on Networks and Communications  
Intrusion Detection System which is increasingly a key part of system defense is used to identify abnormal activities in a computer system.  ...  The success of an intrusion detection system depends on the selection of the appropriate features in detecting the intrusion activity.  ...  Let (X, A) be an information system where X is the universe of discourse and A is a nonempty finite set of attributes such that a : X → V a for every a Є A.  ... 
doi:10.14738/tnc.22.97 fatcat:mjunm7lqgrfdxnkp4lplam3kee

Page 183 of IEEE Transactions on Computers Vol. 52, Issue 2 [page]

2003 IEEE Transactions on Computers  
These include quantifying attacker behavior [37], analysis of the reliability, latency, and cost-benefit for a system given that the probabilities for failures and successful intrusions are known for each  ...  component [36], model-based quantification of survivability metrics [50], and analysis of the security achievable using multiple cryptographic techniques [2]. rhe use of redundancy—especially method redundancy  ... 
« Previous Showing results 1 — 15 out of 8,274 results