首页> 外文期刊>Brazilian Computer Society. Journal >On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions
【24h】

On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions

机译:论隐形攻击和入侵下复制和恢复活力的可靠性和可用性

获取原文
           

摘要

This paper considers the estimation of reliability and availability of intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen the dependability properties they were meant to improve. We model intrusions as a probabilistic effect of adversarial efforts and analyze different strategies of attack and rejuvenation. We compare several configurations of intrusion-tolerant replication and proactive rejuvenation, and varying mission times and expected times to node-intrusion. In doing so, we identify thresholds that distinguish between improvement and degradation of dependability, with a focus on security. We highlight the complementarity of replication and rejuvenation, showing improvements of resilience not attainable with any of the techniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplete specifications.
机译:本文考虑了通过隐形攻击引起的不可检测的入侵的入侵耐受系统的可靠性和可用性的估算。我们观察到,在某些情况下,典型的入侵耐受技术可能使它们旨在改善的可靠性特性恶化。我们模型入侵作为对抗努力的概率效应,并分析了不同的攻击策略和恢复活力。我们比较若干配置的入侵宽容复制和积极的复兴,以及不同的任务时间和预期的节点入侵的时间。在这样做时,我们识别区分改善和降低可靠性之间的阈值,重点是安全性。我们突出了复制和复兴的互补性,显示出不可能对任何技术无法实现的恢复性的改进,但是当它们组合时可能。我们通过显示不完整规范产生的漏洞来提倡对Thorougher系统模型的需求。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号