Model-Based Validation of an Intrusion-Tolerant Information System

  • Authors:
  • Fabrice Stevens;Tod Courtney;Sankalp Singh;Adnan Agbaria;John F. Meyer;William H. Sanders;Partha Pal

  • Affiliations:
  • University of Illinois;University of Illinois;University of Illinois;University of Illinois;University of Michigan;University of Illinois;BBN Technologies, Cambridge, MA

  • Venue:
  • SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where attackers typically seek to degrade quality of service by intrusions that exploit vulnerabilities in networks, operating systems, and application software. Accordingly, designers are seeking improved techniques for validating such systems with respect to specified survivability requirements. In this regard, we describe a model-based validation effort that was undertaken as part of a unified approach to validating a networked intrusion-tolerant information system. Model-based results were used to guide the systemýs design as well as to determine whether a given survivability requirement was satisfied.