Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
The Design of Rijndael
QoS-Centric Stateful Resource Management in Information Systems
Information Systems Frontiers
Analytic Evaluation of Shared-Memory Architectures
IEEE Transactions on Parallel and Distributed Systems
Using Disk Throughput Data in Predictions of End-to-End Grid Data Transfers
GRID '02 Proceedings of the Third International Workshop on Grid Computing
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Predictive Application-Performance Modeling in a Computational Grid Environment
HPDC '99 Proceedings of the 8th IEEE International Symposium on High Performance Distributed Computing
Adaptive Cyberdefense for Survival and Intrusion Tolerance
IEEE Internet Computing
ICSEW '07 Proceedings of the 29th International Conference on Software Engineering Workshops
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design
Learning Application Models for Utility Resource Planning
ICAC '06 Proceedings of the 2006 IEEE International Conference on Autonomic Computing
Unifying strategies and tactics: a survivability framework for countering cyber attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Information-Knowledge-Systems Management
Voice quality prediction models and their application in VoIP networks
IEEE Transactions on Multimedia
Hi-index | 0.00 |
Three types of activities may run on computer and network systems at the same time: services, security mechanisms, and attacks. Computer and network systems should sustain legitimate cyber services even under attacks. In this study, system impacts of services, security mechanisms and attacks are investigated and used to develop strategies for system survivability. Experiments are conducted to collect system dynamics data under two services of voice communication and motion detection, two security mechanisms of data encryption and intrusion detection, and five cyber attacks. Statistical analyses are performed on the experimental data to identify system-wide impacts of services, security mechanisms and attacks on system activities, state and performance. The analytical results reveal the system impact characteristics of these services, security mechanisms, and attacks on IO and file operations and bytes, page and cache faults, memory usage, CPU usage, and network traffic. The competition for system resources by all the activities in the system manifests themselves predominantly in their competition for limited CPU time. This competition for limited CPU time can be used as a strategy to ensure system survivability by increasing the activity level of legitimate services to leave less CPU time for attacks and thus suppress the level and system impacts of attacks while sustaining CPU time for legitimate services.