Skip to main content

Security modeling and quantification of intrusion tolerant systems using attack-response graph

Publication ,  Journal Article
Madan, BB; Trivedi, KS
Published in: Journal of High Speed Networks
December 29, 2004

Increasing deployment of computer systems in critical applications has made study and quantifiable analysis of the security aspects of these systems an important issue. Security quantification analysis can either be done by logging large amounts of operational data and analyzing this data or by developing analytic models. First approach, though straight forward, is less desirable, since such an analysis is typically done in a post-facto manner, after the damage caused by a security breach has already occurred. The modeling approach, on the other hand, can be done in an a-priori manner and is also much less costly. Another aspect of designing secure systems that is gaining acceptance is that while preventing security attacks is an important goal, it is not always possible to be able to prevent all types of attacks, particularly since attackers are always creating newer attacks. Recent approaches to designing dependable systems suggest treating intrusion prevention as a first line of defense to be followed by building intrusion tolerance measures that do not entirely preclude the possibility of security intrusion from succeeding. Such systems take appropriate responsive measures to mitigate the adverse effects of security intrusions. In this paper, we utilize the attack or privilege graph models that have been successfully used to model the attack progression to incorporate the system's response to an attack and for verifying if the system is secure or not. The proposed model is referred to as the attack response graph. Security quantification uses a Markov chain model to compute mean time taken to reach security failed states. However, getting to the Markov chain directly is rather difficult. Instead, we first obtain the SPN from the ARG description. The reachability graph of this SPN gives the absorbing state Markov chain which in turn is used to quantify the security in terms of the mean-time-to-security-failure measure for an intrusion tolerant system. Finally, we utilize sensitivity analysis to evaluate the effects of inaccuracies in estimating the model parameters.

Duke Scholars

Published In

Journal of High Speed Networks

ISSN

0926-6801

Publication Date

December 29, 2004

Volume

13

Issue

4

Start / End Page

297 / 308

Related Subject Headings

  • Networking & Telecommunications
  • 4606 Distributed computing and systems software
  • 4602 Artificial intelligence
  • 4008 Electrical engineering
  • 0906 Electrical and Electronic Engineering
  • 0801 Artificial Intelligence and Image Processing
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Madan, B. B., & Trivedi, K. S. (2004). Security modeling and quantification of intrusion tolerant systems using attack-response graph. Journal of High Speed Networks, 13(4), 297–308.
Madan, B. B., and K. S. Trivedi. “Security modeling and quantification of intrusion tolerant systems using attack-response graph.” Journal of High Speed Networks 13, no. 4 (December 29, 2004): 297–308.
Madan BB, Trivedi KS. Security modeling and quantification of intrusion tolerant systems using attack-response graph. Journal of High Speed Networks. 2004 Dec 29;13(4):297–308.
Madan, B. B., and K. S. Trivedi. “Security modeling and quantification of intrusion tolerant systems using attack-response graph.” Journal of High Speed Networks, vol. 13, no. 4, Dec. 2004, pp. 297–308.
Madan BB, Trivedi KS. Security modeling and quantification of intrusion tolerant systems using attack-response graph. Journal of High Speed Networks. 2004 Dec 29;13(4):297–308.

Published In

Journal of High Speed Networks

ISSN

0926-6801

Publication Date

December 29, 2004

Volume

13

Issue

4

Start / End Page

297 / 308

Related Subject Headings

  • Networking & Telecommunications
  • 4606 Distributed computing and systems software
  • 4602 Artificial intelligence
  • 4008 Electrical engineering
  • 0906 Electrical and Electronic Engineering
  • 0801 Artificial Intelligence and Image Processing