×

An adaptive mode control algorithm of a scalable intrusion tolerant architecture. (English) Zbl 1250.68062

Summary: In this paper we consider an intrusion tolerant system with two detection modes; automatic detection mode and manual detection mode for intrusions, which is called SITAR (scalable intrusion tolerant architecture), and describe the dynamic transition behavior by a continuous-time semi-Markov chain (CTSMC). Based on the embedded Markov chain (EMC) approach, we derive the steady-state probability of the CTSMC, the steady-state system availability and the mean time to security failure (MTTSF). Especially, we show necessary and sufficient conditions to exist the optimal switching time from an automatic detection mode to a manual detection mode, which maximizes the steady-state system availability. Next, we develop an adaptive mode control scheme to estimate the optimal switching time without specifying the associated probability distribution function, whose idea behind is based on a statistically non-parametric algorithm by means of the total time on test concept. Numerical examples through a comprehensive simulation study are presented for illustrating the optimal switching of detection mode, and investigating the asymptotic property of the resulting adaptive mode control scheme.

MSC:

68M10 Network design and communication in computer systems
62P99 Applications of statistics
94C12 Fault detection; testing in circuits and networks
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Avizienis, A.; Laprie, J. C.; Randell, B.; Landwehr, C., Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secure Comput., 1, 1, 11-33 (2004)
[2] Deswarte, Y.; Powell, D., Internet security: an intrusion-tolerance approach, Proc. IEEE, 94, 2, 432-441 (2006)
[3] Dohi, T.; Kaio, N.; Osaki, S., The total time on test processes and their application to maintenance problems, (Hayakawa, Y.; Irony, T.; Xie, M., System and Bayesian Reliability - Essays in Honor of Professor Richard E. Barlow on His 70th Birthday (2001), World Scientific), 123-143
[4] Dohi, T.; Uemura, T., Towards autonomic mode control of a scalable intrusion tolerant architecture, (Xie, B.; Branke, J.; Sadjadi, S. M.; Zhang, D.; Zhou, X., The 7th International Conference on Autonomic and Trusted Computing (ATC 2010). The 7th International Conference on Autonomic and Trusted Computing (ATC 2010), Lecture Notes in Comput. Sci., vol. 6407 (2010), Springer-Verlag), 283-297
[5] Fujimoto, R.; Okamura, H.; Dohi, T., Security evaluation of an intrusion tolerant system with MRSPNs, (Proceedings of 4th International Conference on Availability, Reliability and Security (ARES 2009) (2009), IEEE CS Press), 427-432
[6] Jonsson, E.; Olovsson, T., A quantitative model of the security intrusion process based on attacker behavior, IEEE Trans. Softw. Eng., 23, 4, 235-245 (1997)
[7] Kephart, J.; Chessn, D., The vision of autonomic computing, IEEE Comput., 36, 2, 41-50 (2003)
[8] Littlewood, B.; Brocklehurst, S.; Fenton, N.; Mellor, P.; Page, S.; Wright, D.; Doboson, J.; McDermid, J.; Gollmann, D., Towards operational measures of computer security, J. Comput. Secur., 2, 2/3, 211-229 (1993)
[9] Madan, B. B.; Goseva-Popstojanova, K.; Vaidyanathan, K.; Trivedi, K. S., Modeling and quantification of security attributes of software systems, (Proceedings of 32nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2002) (2002), IEEE CS Press), 505-514
[10] Madan, B. B.; Goseva-Popstojanova, K.; Vaidyanathan, K.; Trivedi, K. S., A method for modeling and quantifying the security attributes of intrusion tolerant systems, Perform. Eval., 56, 1/4, 167-186 (2004)
[11] Ortalo, R.; Deswarte, Y.; Kaaniche, M., Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Trans. Softw. Eng., 25, 5, 633-665 (1999)
[12] Park, B.; Park, K.; Kim, S., A self-healing mechanism for an intrusion tolerance system, (Katsikas, S.; Lopez, J.; Pernul, G., Trust, Privacy and Security in Digital Business (TrustBus 2005). Trust, Privacy and Security in Digital Business (TrustBus 2005), Lecture Notes in Comput. Sci., vol. 3592 (2005), Springer-Verlag), 41-49
[13] Uemura, T.; Dohi, T., Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models, (Denko, M. K.; Shih, C.-S.; Li, K.-C.; Tsao, S.-L.; Zeng, Q.-A.; Park, S.-H.; Ko, Y.-B.; Hung, S.-H.; Park, J.-H., Emerging Directions in Embedded and Ubiquitous Computing. Emerging Directions in Embedded and Ubiquitous Computing, Lecture Notes in Comput. Sci., vol. 4809 (2007), Springer-Verlag), 31-42
[14] Uemura, T.; Dohi, T., Optimizing security measures in an intrusion tolerant database system, (Nanya, T.; Maruyama, F.; Pataricza, A.; Malek, M., Service Availability: 5th International Service Availability Symposium. Service Availability: 5th International Service Availability Symposium, Lecture Notes in Comput. Sci., vol. 501 (2008), Springer-Verlag), 26-42
[15] Uemura, T.; Dohi, T., Optimal security patch management policies maximizing system availability, J. Commun., 5, 1, 71-80 (2010)
[16] Uemura, T.; Dohi, T.; Kaio, N., Availability analysis of a scalable intrusion tolerant architecture with two detection modes, (Jaatun, M. G.; Zhao, G.; Rong, C., Proceedings of 1st International Conference on Cloud Computing (CloudCom 2009). Proceedings of 1st International Conference on Cloud Computing (CloudCom 2009), Lecture Notes in Comput. Sci., vol. 5931 (2009), Springer-Verlag), 178-189
[17] Uemura, T.; Dohi, T.; Kaio, N., Availability analysis of an IMS-based VoIP network system, (Taniar, D.; Gervasi, O.; Murgante, B.; Pardede, E.; Apduhan, B. O., Computational Science and Its Applications Part IV (ICCSA 2010). Computational Science and Its Applications Part IV (ICCSA 2010), Lecture Notes in Comput. Sci., vol. 6019 (2010), Springer-Verlag), 441-456
[18] Uemura, T.; Dohi, T.; Kaio, N., Availability analysis of an intrusion tolerant distributed server system with preventive maintenance, IEEE Trans. Reliab., 59, 1, 18-29 (2010)
[19] Uemura, T.; Dohi, T.; Kaio, N., Dependability analysis of a scalable intrusion tolerant architecture with two detection modes, J. Internet Technol., 11, 2, 289-298 (2010)
[20] Wang, A. H.; Yan, S.; Liu, P., A semi-Markovian survivability evaluation model for intrusion tolerant database systems, (Proceedings of 5th International Conference on Availability, Reliability and Security (ARES 2010) (2010), IEEE CS Press), 427-432
[21] Wang, D.; Madan, B. B.; Trivedi, K. S., Security analysis of SITAR intrusion tolerance system, (Proceedings of 2nd Annual IEEE Systems, Man and Cybernetics, Information Assurance Workshop (2003), ACM), 23-32
[22] Wang, F.; Gong, F.; Sargor, C.; Goseva-Popstojanova, K.; Trivedi, K. S.; Jou, F., SITAR: A scalable intrusion-tolerant architecture for distributed services, (Proceedings of 2nd Annual IEEE Systems, Man and Cybernetics, Information Assurance Workshop (2001), IEEE Press)
[23] Wang, H.; Liu, P., Modeling and evaluating the survivability of an intrusion tolerant database system, (Gollmann, D.; Meier, J.; Sabelfeld, A., European Symposium on Research in Computer Security 2006. European Symposium on Research in Computer Security 2006, Lecture Notes in Comput. Sci., vol. 4189 (2006), Springer-Verlag), 207-224
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.