Survivability through Intrusion-Aware Design
نویسندگان
چکیده
“CERT” and “CERT Coordination Center” are registered in the U.S. Patent and Trademark Office.
منابع مشابه
Security Requirements Engineering through Iterative Intrusion-Aware Design
Fundamental to the Survivable Network Analysis (SNA) method, developed at the SEI [2], is the use of intrusion scenarios to improve the survivability of system designs. This position statement describes some relevant insights gained from applying SNA to several significant real-world systems. These insights help understand what is needed to use intrusion scenarios for security requirements engi...
متن کاملOn Survivability of Mobile Cyber Physical Systems with Intrusion Detection
In this paper we address the survivability issue of amobile cyber physical system (MCPS) comprising sensor-carried human actors, vehicles, or robots assembled together for executing a specific mission in battlefield or emergency response situations. We develop a mathematical model to assess the survivability property of aMCPS subject to energy exhaustion and security failure. Our model-based an...
متن کاملEnhancing the Survivability of Intrusion Detection Agents through Port Switching and Peer-to-peer Replication
Security applications such as intrusion detection software often lack a security-conscious design that supports their vigilance goal. Similarly, software generation tools and libraries typically lack security constructs that support the development more robust systems. The latter is the case of agent-generation frameworks, which are rarely designed to guarantee agents a safe, continuous functio...
متن کاملEIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملTrustworthy Refinement Through Intrusion-Aware Design
..................................................................................................................ix
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001