DocumentCode
2176155
Title
Modeling and quantification of security attributes of software systems
Author
Madan, Bharat B. ; Gogeva-Popstojanova, K. ; Vaidyanathan, Kalyanaraman ; Trivedi, Kishor S.
Author_Institution
Dept. of Electr. & Comput. Eng., Duke Univ., Durham, NC, USA
fYear
2002
fDate
2002
Firstpage
505
Lastpage
514
Abstract
Quite often failures in network based services and server systems may not be accidental, but rather caused by deliberate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning despite security attacks. Not only is it important to prevent or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with, if not more important than other QoS attributes such as availability and performability. This paper deals with various issues related to quantifying the security attribute of an intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intrusion tolerant system to the attack is modeled as a random process. This facilitates the use of stochastic modeling techniques to capture the attacker behavior as well as the system\´s response to a security intrusion. This model is used to analyze and quantify the security attributes of the system. The security quantification analysis is first carried out for steady-state behavior leading to measures like steady-state availability. By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" and also compute probabilities of security failure due to violations of different security attributes.
Keywords
computer network reliability; quality of service; random processes; security of data; telecommunication security; QoS; SITAR system; failure probabilities; intrusion tolerant system; network based service failures; random process; security attacks; security intrusions; server systems failure; software security attribute quantification; steady-state behavior; stochastic modeling techniques; Application software; Availability; Boolean functions; Computer science; Data structures; Information security; Network servers; Software systems; Steady-state; Time measurement;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on
Print_ISBN
0-7695-1101-5
Type
conf
DOI
10.1109/DSN.2002.1028941
Filename
1028941
Link To Document