Skip to main content

Security analysis of SITAR intrusion tolerance system

Publication ,  Journal Article
Wang, D; Madan, BB; Trivedi, KS
Published in: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems
January 1, 2003

Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional characteristics and security mechanisms. Such a characterization is not only ad hoc, it also lacks rigorous scientific and systematic basis. Some recent research efforts have emphasized the need for a quantitative assessment of security attributes for intrusion tolerant systems. Intrusion tolerant systems are not only complex, but also have to operate in an environment made unpredictable due to the unpredictable actions of bona-fide and non bona-fide users. This makes quantitative security analysis a difficult problem. Earlier approaches to security modelling have been based on the use of Markov models. Capturing details of real architectures in a manually constructed Markov model is difficult. We advocate the use of higher level formalism based on stochastic Petri nets for modelling and quantitative security analysis of intrusion tolerant systems. To validate our approach, we use an experimental intrusion tolerant systems known as the SITAR (scalable intrusion tolerant architecture) currently being implemented jointly at MCNC and Duke University as our target system. It is shown that the resulting analysis is useful in determining gains in security by reconfiguring such a system in terms of increase in redundancy under varying threat levels.

Duke Scholars

Published In

Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems

DOI

Publication Date

January 1, 2003

Start / End Page

23 / 32
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, D., Madan, B. B., & Trivedi, K. S. (2003). Security analysis of SITAR intrusion tolerance system. Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, 23–32. https://doi.org/10.1145/1036921.1036924
Wang, D., B. B. Madan, and K. S. Trivedi. “Security analysis of SITAR intrusion tolerance system.” Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, January 1, 2003, 23–32. https://doi.org/10.1145/1036921.1036924.
Wang D, Madan BB, Trivedi KS. Security analysis of SITAR intrusion tolerance system. Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems. 2003 Jan 1;23–32.
Wang, D., et al. “Security analysis of SITAR intrusion tolerance system.” Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, Jan. 2003, pp. 23–32. Scopus, doi:10.1145/1036921.1036924.
Wang D, Madan BB, Trivedi KS. Security analysis of SITAR intrusion tolerance system. Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems. 2003 Jan 1;23–32.

Published In

Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems

DOI

Publication Date

January 1, 2003

Start / End Page

23 / 32