Brazilian Computer Society. Journal | |
On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions | |
s Teixeira 1  Luí2  d’3  Aguiar 4  Norton 5  | |
[1] Computer Engineering Department, Carnegie Mellon University, Pittsburgh, USA;Electrical &LaSIGE, Faculdade de Ciências, Departamento de Informática, Universidade de Lisboa, Lisboa, Portugal | |
关键词: Reliability; Availability; Resilence; Security; Dependability; Intrusion tolerance; Stealthiness; Replication; Rejuvenation; Models; | |
DOI : 10.1007/s13173-012-0062-x | |
学科分类:农业科学(综合) | |
来源: Springer U K | |
【 摘 要 】
This paper considers the estimation of reliability and availability of intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen the dependability properties they were meant to improve. We model intrusions as a probabilistic effect of adversarial efforts and analyze different strategies of attack and rejuvenation. We compare several configurations of intrusion-tolerant replication and proactive rejuvenation, and varying mission times and expected times to node-intrusion. In doing so, we identify thresholds that distinguish between improvement and degradation of dependability, with a focus on security. We highlight the complementarity of replication and rejuvenation, showing improvements of resilience not attainable with any of the techniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplete specifications.
【 授权许可】
CC BY
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201902191478189ZK.pdf | 1316KB | download |