Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System

被引:0
|
作者
Chang, Xiaolin [1 ]
Lv, Shaohua [1 ]
Rodriguez, Ricardo J. [2 ]
Trivedi, Kishor [3 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing, Peoples R China
[2] Acad Gen Mil, Ctr Univ Def, Zaragoza, Spain
[3] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27706 USA
关键词
Reactive defense strategy; Quantitative analysis; Stochastic Reward Nets; Survivability; Security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper aims to analyze transient security and dependability of a vulnerable critical system, under vulnerability-related attack and two reactive defense strategies, from a severe vulnerability announcement until the vulnerability is fully removed from the system. By severe, we mean that the vulnerability-based malware could cause significant damage to the infected system in terms of security and dependability while infecting more and more new vulnerable computer systems. We propose a Markov chain-based survivability model for capturing the vulnerable critical system behaviors during the vulnerability elimination process. A high-level formalism based on Stochastic Reward Nets is applied to automatically generate and solve the survivability model. Survivability metrics are defined to quantify system attributes. The proposed model and metrics not only enable us to quantitatively assess the system survivability in terms of security risk and dependability, but also provide insights on the system investment decision. Numerical experiments are constructed to study the impact of key parameters on system security, dependability and profit.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Modelling Security of Critical Infrastructures: A Survivability Assessment
    Rodriguez, Ricardo J.
    Merseguer, Jose
    Bernardi, Simona
    COMPUTER JOURNAL, 2015, 58 (10): : 2313 - 2327
  • [12] Security and survivability of large scale critical infrastructures
    Bigham, J
    DEPENDABLE COMPUTING: EDCC-4, PROCEEDINGS, 2002, 2485 : 84 - 85
  • [13] Dependability and security in medical information system
    Zou, Xukai
    Dai, Yuan-Shun
    Doebbeling, Bradley
    Qi, Mingrui
    HUMAN-COMPUTER INTERACTION, PT 4, PROCEEDINGS: HCI APPLICATIONS AND SERVICES, 2007, 4553 : 549 - +
  • [14] Integration of analytic model and simulation model for analysis on system survivability
    Lee, Jang Se
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 6 - 10
  • [15] Towards an integrated conceptual model of security and dependability
    Jonsson, Erland
    First International Conference on Availability, Reliability and Security, Proceedings, 2006, : 646 - 653
  • [16] Fuzzing: Cyberphysical System Testing for Security and Dependability
    Serpanos, Dimitrios
    Katsigiannis, Konstantinos
    COMPUTER, 2021, 54 (09) : 86 - 89
  • [17] Model-based Survivability Analysis of a Virtualized System
    Chang, Xiaolin
    Zhang, Zhenjiang
    Li, Xiaodan
    Trivedi, Kishor S.
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 611 - 614
  • [18] System survivability through security bug tolerance
    Pu, C
    Cowan, C
    THIRD IEEE INTERNATIONAL HIGH-ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 1998, : 108 - 108
  • [19] A Dependability Model for TMR System
    JunJie Peng YanPing Liu YuanYuan Chen School of Computer Engineering and Science Shanghai University Shanghai PRC Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing PRC
    International Journal of Automation & Computing, 2012, (03) : 315 - 324
  • [20] A dependability model for TMR system
    Jun-Jie Peng
    Yan-Ping Liu
    Yuan-Yuan Chen
    International Journal of Automation and Computing, 2012, 9 (3) : 315 - 324