Skip to main content
Journal cover image

A method for modeling and quantifying the security attributes of intrusion tolerant systems

Publication ,  Journal Article
Madan, BB; Goševa-Popstojanova, K; Vaidyanathan, K; Trivedi, KS
Published in: Performance Evaluation
March 1, 2004

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate security intrusions, it is equally important to treat security as a QoS attribute at par with other QoS attributes such as availability and performance. This paper deals with various issues related to quantifying the security attributes of an intrusion tolerant system, such as the SITAR system. A security intrusion and the response of an intrusion tolerant system to an attack is modeled as a random process. This facilitates the use of stochastic modeling techniques to capture the attacker behavior as well as the system's response to a security intrusion. This model is used to analyze and quantify the security attributes of the system. The security quantification analysis is first carried out for steady-state behavior leading to measures like steady-state availability. By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" (MTTSF) and also compute probabilities of security failure due to violations of different security attributes. © 2003 Published by Elsevier B.V.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

Performance Evaluation

DOI

ISSN

0166-5316

Publication Date

March 1, 2004

Volume

56

Issue

1-4

Start / End Page

167 / 186

Related Subject Headings

  • Networking & Telecommunications
  • 49 Mathematical sciences
  • 46 Information and computing sciences
  • 10 Technology
  • 08 Information and Computing Sciences
  • 01 Mathematical Sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Madan, B. B., Goševa-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2004). A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 56(1–4), 167–186. https://doi.org/10.1016/j.peva.2003.07.008
Madan, B. B., K. Goševa-Popstojanova, K. Vaidyanathan, and K. S. Trivedi. “A method for modeling and quantifying the security attributes of intrusion tolerant systems.” Performance Evaluation 56, no. 1–4 (March 1, 2004): 167–86. https://doi.org/10.1016/j.peva.2003.07.008.
Madan BB, Goševa-Popstojanova K, Vaidyanathan K, Trivedi KS. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation. 2004 Mar 1;56(1–4):167–86.
Madan, B. B., et al. “A method for modeling and quantifying the security attributes of intrusion tolerant systems.” Performance Evaluation, vol. 56, no. 1–4, Mar. 2004, pp. 167–86. Scopus, doi:10.1016/j.peva.2003.07.008.
Madan BB, Goševa-Popstojanova K, Vaidyanathan K, Trivedi KS. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation. 2004 Mar 1;56(1–4):167–186.
Journal cover image

Published In

Performance Evaluation

DOI

ISSN

0166-5316

Publication Date

March 1, 2004

Volume

56

Issue

1-4

Start / End Page

167 / 186

Related Subject Headings

  • Networking & Telecommunications
  • 49 Mathematical sciences
  • 46 Information and computing sciences
  • 10 Technology
  • 08 Information and Computing Sciences
  • 01 Mathematical Sciences