Abstract
The dependability analysis of an ITS (Intrusion Tolerance System – a system that performs continuously minimal essential services even when the computer system is partially compromised because of intrusions) is essential for the design of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to analyze the dependability of the ITS. In other words, we described the state transition of the ITS composed of a primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and analyzed it using M/G/1 queuing technique. We also evaluated the availability of the ITS through simulation experiments.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Wang, F., Uppalli, R., Killian, C.: Analysis of Techniques for Building Intrusion Tolerant Server Systems. In: Proceedings of Military Communications Conference, October 2003, pp. 729–734 (2003)
Reynolds, J., et al.: On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generalization. In: Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, January 2003, pp. 335–342 (2003)
Wang, F., et al.: SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In: Proceedings of the Foundations of Intrusion Tolerant Systems, pp. 359–367 (2003)
Courtney, T., et al.: Providing Intrusion Tolerance with ITUA. In: Proceedings of the International Conference on Dependable Systems & Networks, pp. C-5-1–C-5-3 (2002)
Koopman, P.: Elements of the Self-Healing System Problem Space. In: Workshop on Architecting Dependable Systems, May 2003, pp. 31–36 (2003)
Chess, D., Palmer, C., White, S.: Security in an Autonomic Computing Environment. IBM Systems Journal 42(1), 107–118 (2003)
Goseva-Popstojanova, K., et al.: Characterizing Intrusion Tolerant Systems using a State Transition Model. In: DARPA Information Survivability Conference and exhibition, June 2001, vol. 2, pp. 211–221 (2001)
Wang, D., Madan, B., Trivedi, K.: Security Analysis of SITAR Intrusion Tolerance System. In: Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, October 2003, pp. 23–32 (2003)
Kim, G., Choi, M., Lee, K.: Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement. The Korea Information Processing Society Transactions 10C(3), 295–304 (2003)
Shelton, C., Koopman, P., Nace, W.: A Framework for Scalable Analysis and Design of System-Wide Graceful degradation in distributed Embedded Systems. In: Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems, January 2003, pp. 156–163 (2003)
Kephart, J., Chess, D.: The Vision of Autonomic Computing. IEEE Computer 36(2), 41–50 (2003)
Kleinrock, L.: Queueing Systems: Theory, vol. 1, p. 417. John Wiley & Sons, Chichester (1975)
Trivedi, K.: Probability and Statistics with Reliability Queueing and Computer Science Applications, p. 472. John Wiley & Sons, Inc., Chichester (2002)
Madan, B., et al.: Modeling and Quantification of Security Attributes of Software Systems. In: International Conference on Dependable Systems and Networks, June 2002, pp. 505–514 (2002)
Madan, B., et al.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56(1-4), 167–186 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, B., Park, K., Kim, S. (2005). A Self-healing Mechanism for an Intrusion Tolerance System. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_5
Download citation
DOI: https://doi.org/10.1007/11537878_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28224-2
Online ISBN: 978-3-540-31796-8
eBook Packages: Computer ScienceComputer Science (R0)