Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models
نویسندگان
چکیده
In this paper we quantitatively evaluate the security of intrusion tolerant systems with preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we develop two semi-Markov cost models and describe the stochastic behavior of two intrusion tolerant systems with different preventive maintenance policies. The optimal preventive maintenance schedules are analytically derived to minimize the long-run average costs. We further perform the sensitivity analysis of the model parameters through numerical experiments. The results obtained here would be also useful to design ubiquitous systems subject to external malicious attacks.
منابع مشابه
Modeling SITAR System Security
Recent strategies to protect system security lay emphasis on designing intrusion-tolerant systems that are able to tolerate intrusions using techniques such as redundancy, diversity, reconfiguration and graceful degradation. These systems are expected to not only detect and tolerate attacks, but also repair, or rejuvenate themselves so as to remove any damage caused by an intrusion. Several res...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملS Devaraju and S Ramakrishnan: Performance Comparison of Intrusion Detection System Using Various Techniques – a Review
Nowadays, the security has become a critical part of any organization or industry information systems. The Intrusion Detection System is an effective method to deal with the new kind of threats such as DoS, Porbe, R2L and U2R. In this paper, we analyze the various approaches such as Hidden Semi Markov Model, Conditional Random Fields and Layered Approach, Bayesian classification, Data Mining te...
متن کاملHighly Available Smart Grid Control Centers through Intrusion Tolerance
Societies’ norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious atta...
متن کاملIdentification of New Connections for IP Intrusion Detections using WEKA Platform and KDD
Intrusion detection is an essential mechanism to protect computer systems from many attacks. Clustering is the most acceptable technique to regroup the raw data into clusters but it cannot identify them. In this paper, we present a technique for the identification of unknown TCP connections using K-mean WEKA-based. Specifically, we built mixture models using KDD cup 99 and our traffic traces ca...
متن کامل