Qos and Control-theoretic Techniques for Intrusion Tolerance
نویسنده
چکیده
As we increasingly rely on information systems to support a multitude of critical operations, it becomes more and more important that these systems are able to deliver quality of service, even in the face of intrusions. One common class of cyber-attacks is the flooding of the system’s resources with requests for service. Thus, a reliable information system must be able to adeptly handle a large number of requests efficiently so that legitimate users may still use the system even as illegitimate users are attempting to flood the system. This report examines two host-based resources and presents simulated models of modifications that can be made to these resources to make them capable of handling a number of requests. The two resources examined are a router and a web server. There are two different quality of service models presented for the router. The first model implements a router with a feedback control loop that monitors the instantaneous quality of service guarantee and adjusts the router’s admission control of new requests accordingly. This model is compared to the basic router model that represents the typical configuration currently in use. The resulting comparison indicates that the feedback control loop is an improvement on the existing basic router. It decreases the time-in-system for data packets, and reduces packet loss, but does not fully utilize its bandwidth as well as a basic router with over-characterization. The second router model suggests a new approach of queuing new requests for service. This approach is called Adjusted Weighted Shortest Processing Time and queues data packets according to a weight, which is dependent on their initial priority weight and the amount of time they have awaited service. The new approach is compared to two other queuing disciplines – Weighted Shortest Processing Time and First-Come First-Serve. We present data that indicate that the Adjusted Weighted Shortest Processing Time discipline improves the high time-in-system variance that exists in the Weighted Shortest Processing Time discipline, but it does not fairly allocate resources to both high and low priority data packets. For the web server, six queuing disciplines are simulated and analyzed for their efficiency in delivering quality of service. These disciplines are Best Effort, Differentiated Services, Apparent Tardiness Cost, Earliest Due Date, Weighted Shortest Processing Time, and Weighted Only. These disciplines are compared on the basis of selected quality of service measurements, including lateness, drop rate, time-in-system, and throughput. We find that there is not necessarily one best queuing rule to follow; the appropriate discipline selection depends on the needs of that web server.
منابع مشابه
Model Based Analysis for QoS Guarantee by Intrusion Detection System in Heterogeneous Wireless Sensor Networks
In this paper we propose a model based analysis to provide QoS Guarantee by using the Intrusion Detection System(IDS) in Heterogeneous wireless sensor networks(HWSN).The key concept of our model based analysis is to provide a multipath routing with redundancy management in which the query response probability is maximized and to increase the lifetime of network. In HWSN a voting based intrusion...
متن کاملAdvanced operations research techniques for multi-constraint QoS routing in internet
Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...
متن کاملCT-ISG: Improving Measurable Performance with QoS-Adaptive Cyber-defense Techniques (IMPACT) PROJECT SUMMARY
The past few years have seen significant increase in cyber attacks on the Internet, resulting in degraded confidence and trusts in the use of the Internet and computer systems. The cyber attacks are becoming more sophisticated, spreading quicker, and causing more damage. Attacks originally exploited the weakness of individual protocols and systems, but now start to target the basic infrastructu...
متن کاملQos-aware Spectrum Sharing for Multi-channel Vehicular Network
--We consider QoS -aware band sharing in cognitive wireless networks where secondary users are allowed to access the band owned by a primary network provider. The intrusion from secondary users to primary users is forced to be below the tolerable limit. Also, signal to intrusion plus noise ratio (SINR) of each secondary user is maintained higher than a required level for QoS cover. When network...
متن کاملA Framework for Adaptive Secure Information System
We are facing increasing threats and vulnerability on the Internet. Conventional intrusion detection techniques are not sufficient, especially for new attacks. Thus, it is necessary to adopt intrusion tolerance techniques. However, sophisticated intrusion tolerance techniques may provide better security, but also incur performance penalties. In this paper, we propose an adaptive intrusion toler...
متن کاملTrust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network
Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambigu...
متن کامل