Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models

نویسندگان

  • Richard C. Linger
  • Andrew P. Moore
چکیده

vii 1 Survivable System Concepts 1 2 Service Traces for Survivability Specification 5 2.1 Essential-Service Workflows 5 2.2 Essential-Service Traces 6 2.3 Relational Specification of Trace Components 6 2.4 Computational Survivability 7 3 Intrusion Traces for Adverse Environment Specification 9 3.1 Intruder Workflows Organized Into Attack Trees 10 3.2 Attack Patterns Organized Into Attack Profiles 12 3.3 Refining Attack Trees Using Attack Patterns 13 3.4 Analyzing Attack Trees Using Intrusion Traces 14 4 Survivability Evaluation Models 17

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bidding Strategy on Demand Side Using Eligibility Traces Algorithm

Restructuring in the power industry is followed by splitting different parts and creating a competition between purchasing and selling sections. As a consequence, through an active participation in the energy market, the service provider companies and large consumers create a context for overcoming the problems resulted from lack of demand side participation in the market. The most prominent ch...

متن کامل

Balancing Privacy and Fidelity in Packet Traces for Security Evaluation

Security mechanisms, such as firewalls and intrusion detection systems, protect networks by generating security alarms and possibly filtering attack traffic, according to a specified security policy. Evaluation of such security mechanisms remains a challenge. In this work, we examine the problem of compiling a set of high fidelity traffic traces, that include both attacks and background traffic...

متن کامل

Using a VMware Network Infrastructure to Collect Traffic Traces for Intrusion Detection Evaluation

Since the DARPA Intrusion Detection Evaluation Data Set [2] was made available in 1998, and then updated in 1999 and 2000, it seems that no other significant freely available data sets have been provided to allow benchmarking of Intrusion Detection Systems (IDS). Even if those traffic traces are still used by the security research community, they have not been updated since. The absence of addi...

متن کامل

Versatile File System Tracing with Tracefs

of the Thesis Versatile File System Tracing with Tracefs by Akshat Aranya Master of Science in Computer Science Stony Brook University 2004 File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, however, are difficult to use because they were captured for a specific use and ...

متن کامل

Using Sliding Mode Controller and Eligibility Traces for Controlling the Blood Glucose in Diabetic Patients at the Presence of Fault

Some people suffering from diabetes use insulin injection pumps to control the blood glucose level. Sometimes, the fault may occur in the sensor or actuator of these pumps. The main objective of this paper is controlling the blood glucose level at the desired level and fault-tolerant control of these injection pumps. To this end, the eligibility traces algorithm is combined with the sliding mod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001