Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
Theory of linear and integer programming
Theory of linear and integer programming
Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
Proving time bounds for randomized distributed algorithms
PODC '94 Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing
Safeware: system safety and computers
Safeware: system safety and computers
The complexity of probabilistic verification
Journal of the ACM (JACM)
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Model checking
Survivable Network System Analysis: A Case Study
IEEE Software
Summaries of Three Critical Infrastructure Applications
Summaries of Three Critical Infrastructure Applications
Model checking for a probabilistic branching time logic with fairness
Distributed Computing
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Representation and analysis of coordinated attacks
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Modeling insecurity: policy engineering for survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Attack graph generation and analysis
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Specifying and using intrusion masking models to process distributed operations
Journal of Computer Security
Archetypal behavior in computer security
Journal of Systems and Software
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A Simple, Smart and Extensible Framework for Network Security Measurement
Information Security and Cryptology
Optimizing security measures in an intrusion tolerant database system
ISAS'08 Proceedings of the 5th international conference on Service availability
Ontology-based document profile for vulnerability relevancy analysis
ACS'10 Proceedings of the 10th WSEAS international conference on Applied computer science
A survivability model for cluster system
ICA3PP'05 Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing
A survivability model for cluster system under dos attacks
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Evaluation of network dependability using event injection
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
A model of ITS using cold standby cluster
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
Distributed control for the networks of adaptive software components
Information Systems Frontiers
Hi-index | 0.00 |
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased in importance as critical infrastructures have become heavily dependent on computers. In this paper we present a systematic method for performing survivability analysis of networked systems. An architect injects failure and intrusion events into a system model and then visualizes the effects of the injected events in the form of scenario graphs. Our method enables further global analyses, such as reliability, latency, and cost-benefit analyses, where mathematical techniques used in different domains are combined in a systematic manner. We illustrate our ideas on an abstract model of the United States Payment System.