Browse wiki

From Navigators

Jump to: navigation, search
Abstract This paper considers the estimation of rel This paper considers the estimation of reliability and availability of intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen the dependability properties they were meant to improve. We model intrusions as a probabilistic effect of adversarial efforts and analyze different strategies of attack and rejuvenation. We compare several configurations of intrusion-tolerant replication and proactive rejuvenation, and varying mission times and expected times to node-intrusion. In doing so, we identify thresholds that distinguish between improvement and degradation of dependability, with a focus on security. We highlight the complementarity of replication and rejuvenation, showing improvements of resilience not attainable with any of the techniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplete specifications. es arising from incomplete specifications.
Author Luís T. A. N. Brandão + , Alysson Bessani +
Document Document for Publication-Brandao2012reliabilityJBCS.pdf +
Journal Journal of the Brazilian Computer Society  +
Key Brandao2012reliabilityJBCS  +
Missing ResearchLine  +
Month mar  +
NumPubDate 2,012.03  +
Pages 61–80  +
Project Project:REGENESYS +
Title On the Reliability and Availability of Replicated and Rejuvenating Systems Under Stealth Attacks and Intrusions  +
Type article  +
Url  +
Volume 18  +
Year 2012  +
Categories Publication  +
Modification dateThis property is a special property in this wiki. 23 January 2013 15:37:40  +
hide properties that link here 
  No properties link to this page.


Enter the name of the page to start browsing from.
Personal tools
Navigators toolbox