Qos and Control-theoretic Techniques for Intrusion Tolerance

نویسنده

  • Nong Ye
چکیده

As we increasingly rely on information systems to support a multitude of critical operations, it becomes more and more important that these systems are able to deliver quality of service, even in the face of intrusions. One common class of cyber-attacks is the flooding of the system’s resources with requests for service. Thus, a reliable information system must be able to adeptly handle a large number of requests efficiently so that legitimate users may still use the system even as illegitimate users are attempting to flood the system. This report examines two host-based resources and presents simulated models of modifications that can be made to these resources to make them capable of handling a number of requests. The two resources examined are a router and a web server. There are two different quality of service models presented for the router. The first model implements a router with a feedback control loop that monitors the instantaneous quality of service guarantee and adjusts the router’s admission control of new requests accordingly. This model is compared to the basic router model that represents the typical configuration currently in use. The resulting comparison indicates that the feedback control loop is an improvement on the existing basic router. It decreases the time-in-system for data packets, and reduces packet loss, but does not fully utilize its bandwidth as well as a basic router with over-characterization. The second router model suggests a new approach of queuing new requests for service. This approach is called Adjusted Weighted Shortest Processing Time and queues data packets according to a weight, which is dependent on their initial priority weight and the amount of time they have awaited service. The new approach is compared to two other queuing disciplines – Weighted Shortest Processing Time and First-Come First-Serve. We present data that indicate that the Adjusted Weighted Shortest Processing Time discipline improves the high time-in-system variance that exists in the Weighted Shortest Processing Time discipline, but it does not fairly allocate resources to both high and low priority data packets. For the web server, six queuing disciplines are simulated and analyzed for their efficiency in delivering quality of service. These disciplines are Best Effort, Differentiated Services, Apparent Tardiness Cost, Earliest Due Date, Weighted Shortest Processing Time, and Weighted Only. These disciplines are compared on the basis of selected quality of service measurements, including lateness, drop rate, time-in-system, and throughput. We find that there is not necessarily one best queuing rule to follow; the appropriate discipline selection depends on the needs of that web server.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model Based Analysis for QoS Guarantee by Intrusion Detection System in Heterogeneous Wireless Sensor Networks

In this paper we propose a model based analysis to provide QoS Guarantee by using the Intrusion Detection System(IDS) in Heterogeneous wireless sensor networks(HWSN).The key concept of our model based analysis is to provide a multipath routing with redundancy management in which the query response probability is maximized and to increase the lifetime of network. In HWSN a voting based intrusion...

متن کامل

Advanced operations research techniques for multi-constraint QoS routing in internet

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

متن کامل

CT-ISG: Improving Measurable Performance with QoS-Adaptive Cyber-defense Techniques (IMPACT) PROJECT SUMMARY

The past few years have seen significant increase in cyber attacks on the Internet, resulting in degraded confidence and trusts in the use of the Internet and computer systems. The cyber attacks are becoming more sophisticated, spreading quicker, and causing more damage. Attacks originally exploited the weakness of individual protocols and systems, but now start to target the basic infrastructu...

متن کامل

Qos-aware Spectrum Sharing for Multi-channel Vehicular Network

--We consider QoS -aware band sharing in cognitive wireless networks where secondary users are allowed to access the band owned by a primary network provider. The intrusion from secondary users to primary users is forced to be below the tolerable limit. Also, signal to intrusion plus noise ratio (SINR) of each secondary user is maintained higher than a required level for QoS cover. When network...

متن کامل

A Framework for Adaptive Secure Information System

We are facing increasing threats and vulnerability on the Internet. Conventional intrusion detection techniques are not sufficient, especially for new attacks. Thus, it is necessary to adopt intrusion tolerance techniques. However, sophisticated intrusion tolerance techniques may provide better security, but also incur performance penalties. In this paper, we propose an adaptive intrusion toler...

متن کامل

Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network

Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambigu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004