A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Intrusion-Tolerant Middleware: The Road to Automatic Security
IEEE Security and Privacy
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Optimizing security measures in an intrusion tolerant database system
ISAS'08 Proceedings of the 5th international conference on Service availability
Towards autonomic mode control of a scalable intrusion tolerant architecture
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Availability analysis of an IMS-based VoIP network system
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
An adaptive mode control algorithm of a scalable intrusion tolerant architecture
Journal of Computer and System Sciences
Hi-index | 0.00 |
In this paper we quantitatively evaluate the security of intrusion tolerant systems with preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we develop two semi-Markov cost models and describe the stochastic behavior of two intrusion tolerant systems with different preventive maintenance policies. The optimal preventive maintenance schedules are analytically derived to minimize the long-run average costs. We further perform the sensitivity analysis of the model parameters through numerical experiments. The results obtained here would be also useful to design ubiquitous systems subject to external malicious attacks.