Academia.eduAcademia.edu

Outline

Dependability and security models

2009

Abstract

There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the requirement of professionals in both fault-tolerant computing and security community. In this paper, we present a new classification of dependability and security models. First we present the classification of threats and mitigations in systems and networks. And then we present several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Finally we show that each model type can be combined and represented by one of the model representation techniques: combinatorial (such as reliability block diagrams (RBD), reliability graphs, fault trees, attack trees), state-space (continuous time Markov chains, stochastic Petri nets, fluid stochastic Petri nets, etc) and hierarchical (e.g., fault trees in the upper level and Markov chains in the lower level). We show case studies for each individual model types as well as composite model types.

References (62)

  1. T. Angskun, et al., Reliability Analysis of Self-Healing Network using Discrete-Event Simulation, Proc. of CCGrid 2007.
  2. ANSI T1A1.2 Working Group on Network Survivability Performance, Technical Report on Enhanced Network Survivability Performance, ANSI, Tech. Rep. TR No. 68, 2001.
  3. A. Avizienis, J.-C. Laprie, B. Randell, Fundamental concepts of dependability, TR, LAAS-New Castle University-UCLA, 2001.
  4. A. Avizienis, J.-C. Laprie, B. Randell, C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable and Secure Computing, 1(1) 2004.
  5. Y. Bao, X. Sun, K. S. Trivedi, A Workload-Based Analysis of Software Aging, and Rejuvenation, IEEE Trans. Reliability 54(3), 2005.
  6. D. Chen, K.S. Trivedi, "Analysis of Periodic Preventive Maintenance with General System Failure Distribution," Proc. of PRDC 2001.
  7. D. Chen, et al., "Reliability and availability analysis for the JPL Remote Exploration and Experimentation System," Proc. of DSN 2002.
  8. D. Chen, K. S. Trivedi, Closed-form analytical results for condition- based maintenance, Reliability Engineering and System Safety 76, 2002.
  9. D. Chen, K. S. Trivedi, Optimization for condition-based maintenance with semi-Markov decision process, Reliability Engineering and System Safety 90, 2005.
  10. S. D. Chi, et al., Network security modeling and cyber attack simulation methodology, Proc. of ACISP 2001.
  11. G. Ciardo, K. S. Trivedi, A Decomposition Approach for Stochastic Reward Net Models, Perform. Eval., 18(1), 1993.
  12. H. Choi, W Wang, K. S. Trivedi, "Analysis of conditional MTTF of fault tolerant system", Microelectron and Reliability 38,(3), 1998.
  13. P. K. Choudhary, B. B. Madan, K. S. Trivedi, "Modeling and Simulation of Integrated Voice/Data Cellular Communication with Generally Distributed Delay For End Voice Calls," Proc. of WSC 2005.
  14. S. Convey, D. Cook, M. Franz, An Attack Tree for the Border Gateway Protocol, 2003 : http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00
  15. Dependability, http://www.cs.cornell.edu/Projects/secft/
  16. J. B. Dugan, K. S. Trivedi, Coverage Modeling for Dependability Analysis of Fault-Tolerant Systems, IEEE Trans. Computer, 38(6), 1989.
  17. R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. Longstaff, N. R. Mead. Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013, 1997.
  18. I. Eusgeld, F. C. Freiling, and R. Reussner (Eds.), Dependability Metrics, LNCS 4909, 2008.
  19. R. Geist, K. S. Trivedi, Reliability Estimation of Fault-Tolerant Systems: Tools and Techniques, IEEE Trans. Computer, 23(7), 1990.
  20. K. Goseva-Popstojanov, K. S. Trivedi, Stochastic Modeling Formalisms for Dependability, Performance and Performability, LNCS 1769, 2000
  21. K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. Trivedi, B. Muthusamy, "Characterizing intrusion tolerant systems using a state transition model," Proc. of DARPA Information Survivability Conference & Exposition II, 2001.
  22. M. Grottke, K. Trivedi, Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate. IEEE Trans. Computer 40(2), 2007
  23. G. Haring, R. Marie, R. Puigjaner, K. S. Trivedi, Loss Formulae and Their Application to Optimization for Cellular Networks, IEEE Trans. Veh. Technology, 50, 2001.
  24. R. S. Hanmer, D. T. McBride, V. B. Mendiratta, Comparing Reliability and Security: Concepts, Requirements, and Techniques, Bell Labs. Technical Journal, 12(3), 2007.
  25. P. E. Heegard, K. S. Trivedi, Network survivability modeling, Computer Networks 53(8), 2009.
  26. O. C. Ibe, R. C. Howe, K. S. Trivedi, Approximate Availability Analysis of VAXcluster Systems, IEEE Trans. Reliability 38(1), 1989.
  27. E. Jonsson, L. Strömberg, S. Lindskog, "On the functional relation between security and dependability impairments," Proc. of NSPW 1999.
  28. E. Jonsson, "Towards an integrated conceptual model of security and dependability," Proc. of ARES 2006.
  29. D. S. Kim, F. Machida, K. S. Trivedi, "Availability Modeling and Analysis of a Virtualized System," Proc. of PRDC 2009.
  30. Z. Kincses, "Attack tree of smart cards", Technical Report, 2007.
  31. M. Lanus, L. Yin, K. S. Trivedi, Hierarchical composition and aggregation of state-based availability and performability models. IEEE Trans. Reliability, 52(1), 2003.
  32. N. Levitt, S. Cheung, "Common Techniques in Fault-Tolerance and Security," Proc. of DCCA 1994.
  33. H. F. Lipson, D. A. Fisher, Survivability-a new technical and business perspective on security, Proc. of NSPW 1999.
  34. Y. Liu and K. S. Trivedi, Survivability Quantification: The Analytical Modeling Approach, Int. J. Performability Engineering, 2(1) 2006.
  35. Y. Liu, Survivability of Networked Systems, PhD Dissertation, Duke University, 2008.
  36. B. B. Madan , K. S. Trivedi, Security modeling and quantification of intrusion tolerant systems using attack-response graph, J. High Speed Networks, 13(4), 2004
  37. M. Malhotra, K. S. Trivedi, "Reliability Modeling of Disk Array Systems," Proc. of TOOLS 1992.
  38. M. Malhotra, K. S. Trivedi, "A Methodology for Formal Expression of Hierarchy in Model Solution,"" Proc. of PNPM, 1993.
  39. Y. Ma, J. J. Han, K. S. Trivedi, Composite Performance and Availability Analysis of Communications Networks: A Comparison of Exact and Approximate Approaches, IEEE Trans. Vehi. Technology, 50(5), 2001.
  40. C. Meadows, "Applying the dependability paradigm to computer security," Proc. of NSPW 1995.
  41. C. Meadows, J. McLean, "Security and dependability: then and now," Proc. Computer Security, Dependability and Assurance: From Needs to Solutions, 1998.
  42. A. P. Moore et al., Attack Modeling for Information Security and Survivability, CMU TR, 2001.
  43. D. M. Nicol, W. H. Sanders, K. S. Trivedi, Model-Based Evaluation: From Dependability to Security, IEEE Trans. Dependable and Secure Computing, 1(1), 2004.
  44. B. Parhami, From defects to failures: a view of dependable computing, Computer Architecture News 16(4), 1988.
  45. Quality Concepts and Terminology, part 1: Generic Terms and Definitions. Document ISO/TC 176/SC 1 N 93, 1992.
  46. H. V. Ramasamy and M. Schunter, Architecting Dependable Systems Using Virtualization, In Workshop on DSN-2007.
  47. ResiliNets Wiki, Available at: https://wiki.ittc.ku.edu/resilinets_wiki/index.php/Main_Page
  48. K. Sallhammar, B. E. Helvik, S. J. Knapskog, "Towards a stochastic model for integrated security and dependability evaluation," Proc. of ARES 2006.
  49. H. S. Seo and T. Cho, Modeling and Simulation for Detecting a Distributed Denial of Service Attack, Proc. of AI 2002.
  50. O. Sheyner et al., Automated Generation and Analysis of Attack Graphs, Proc. of IEEE SP 2002.
  51. R. M. Smith, K. S. Trivedi, A. V. Ramesh, Performability Analysis: Measures, an algorithm and a case study, IEEE Trans. Computers C- 37(4), 1988
  52. W. E. Smith, K. S. Trivedi, L. A. Tomek, J. Ackaret, Availability analysis of blade server systems, IBM Systems J. 47(4), 2008.
  53. B. C. Soh, T. S. Dillon, "On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems," Proc. 5th Int. GI/ITG/GMA Conference on Fault-Tolerant Computing Systems, Tests, Diagnosis, Fault Treatment 1991.
  54. K. S. Trivedi, S. Hunter, S. Garg, R. Fricks, "Reliability Analysis Techniques Explored Through a Communication Network Example," Proc. of CADTED 1996.
  55. K. S. Trivedi, Availability Analysis of Cisco GSR 12000 and Juniper M20/M40, Technical Report.
  56. K. S. Trivedi, Probability and Statistics with Reliability, Queuing, and Computer Science Applications. John Wiley & Sons, 2nd edition, 2001.
  57. K. S. Trivedi, R. Vasireddy, D. Trindade, S. Nathan, R. Castro, "Modeling High Availability Systems," Proc. of PRDC 2006.
  58. K. S. Trivedi, D. Wang, D. J. Hunt, A. Rindos, W. E. Smith, B. Vashaw, "Availability Modeling of SIP Protocol on IBM(c) WebSphere(c)," Proc. PRDC 2008.
  59. B. Tuffin, P. K. Choudhary, C. Hirel, K. S. Trivedi, "Simulation versus Analytic-Numeric Methods: a Petri Net Example," Proc. of the 2nd VALUETOOLS Conference 2007.
  60. K. Vaidyanathan, D. Selvamuthu, K. S. Trivedi, "Analysis of Inspection-Based Preventive Maintenance in Operational Software Systems," Proc. of SRDS 2002.
  61. J. P. Walters, Z. Liang, W. Shi and V. Chaudhary, "Wireless sensor network security: A survey", Journal of Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007.
  62. H. Wang, P. Liu, "Modeling and evaluating the survivability of an intrusion tolerant database system," Proc. of ESORICS 2006.