期刊文献+

面向容侵系统可生存性量化的随机博弈模型研究 被引量:3

Qualifying the Survivability of Intrusion Tolerant System Using Stochastic Game Theory
在线阅读 下载PDF
导出
摘要 提出面向生存性研究的容侵系统状态转换模型,提高对容侵过程的描述能力,将入侵者和入侵容忍系统作为随机博弈的局中人,建立了描述入侵过程的随机博弈模型,使用纳什均衡计算了博弈结果,使用基于连续马尔可夫过程的方法对容侵系统可生存性进行了量化评估.最后,利用博弈分析的结果和所建立的评估模型进行了容侵系统的生存性分析,指出了容侵系统生存性敏感的参数. In order to improve the ability of intrusion process description, a survivability-oriented state transition model for the research of Intrusion Tolerant System (ITS) is established, the intruder and ITS are virtualized into the members of a stochastic game, the process of intrusion is modeled by stochastic game theory, the result of this game is computed using Nash-Equilibrium, the survivability of ITS is evaluated by the model based on continuous Markov model. Finally, the survivability is analyzed based on game and CTMC, the sensitive parameters for ITS is pointed out.
出处 《小型微型计算机系统》 CSCD 北大核心 2008年第10期1794-1798,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60743003)资助 国家"八六三"计划项目(2006AA01Z442)资助 湖北省科技攻关项目(2007AA101C44)资助 湖北省自然科学基金项目(2007ABA089)资助
关键词 可生存性 容侵系统 随机博弈论 survivability intrusion tolerant system stochastic game theory
  • 相关文献

参考文献12

  • 1Ellison R J, Fisher B D, Linger R. Survivable network systems :an emerging discipline [R]. Carnegie Mellon : SEI, Technical Report CMU/SEI97 · TR-01, 1997.
  • 2Ellision R J, Fisher D A, Livger R C. An approach to survivable system[EB/OL], http://www. sei. cmu. edu/community/ easel/pdfs/natol. pdf,2000.
  • 3Deswarte Y, Blain L, Fabre J-C. Intrusion tolerance in distributed computing systems[C]. In:Proceedings of the Symposium on Security and Privacy, 1991, Oakland, CA, USAOA: Publby IEEE, Piscataway, NJ, USA.
  • 4Gong F M, Katerina G, Wang F Y. Characterizing intrusion tolerant systems using a state transition model [EB/OL]. http ://www. anr. mcnc. org/projects/SITAR/papers/darpa00. pdf,2000.
  • 5Madan B B, et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems [J].Performance Evaluation, 2004, 56(1-4) :167-186.
  • 6殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 7Liu P. Architectures for intrusion tolerant database systems [C]. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002,IEEE Computer Society.
  • 8Trivedi K S. Probability and statistics with reliability, queuing, and computer science applications (2nd ed. )[M]. John Wiley Sons, 2001.
  • 9McDermott J. Attack-potential-based survivability modeling for high-consequence systems [C]. In: Proceedings. Third IEEE International Workshop on Information Assurance, Callege Park, Maryland, USA,2005.
  • 10Fudenberg D, Tirole J. Game theory[M]. Cambridge: MIT Press,1991.

二级参考文献12

  • 1Allen J. , Christie A. , Fithen W. et al. State of the practice of intrusion detection technologies. Carnegie Mellon, SEI, Technical Report: CMU/SEI-99-TR-028, 2000
  • 2Fraga J. S. , Powell D.. A fault- and intrusion-tolerant file system. In: Proceedings of the 3rd International Conference on Computer Security, Dublin, Ireland, 1985, 203-218
  • 3Jonsson E. , Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245
  • 4Gong F, , Goseva-PopstojanovaVaid-yanathan K. , Trivedi K. ,K., Wang F., Wang R.Muthusamy B.. Characterizing intrusion tolerant systems using a state transition model.In: Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX II), 2001, 2:211-221
  • 5Jha S. , Wing J. M.. Survivability analysis of networked systems. In: Proceedings of the 23rd International Conference on Software Engineering, Toronto, Canada, 2001, 307-317
  • 6Ortalo R. , Deswarte Y. , Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5) :633-650
  • 7Sheyner O. , Haines J. , Jha S. , Lippmann R. , Wing J. M..Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 2002, 273-284
  • 8Wang D. Z. , Madan B. B. , Trivedi K.S.. Modeling SITAR system security. In: Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering, 2003, Denver, USA, C-2 Fast Abstracts
  • 9Madan B. B. , Goseva-Popstojanova K. , Vaidyanathan K. ,Trivedi K. S.. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(1-4): 167-186
  • 10Trivedi K.S.. Probability and Statistics with Reliability,Queuing, and Computer Science Applications. 2nd Edition.New York: John Wiley & Sons, 2002

共引文献26

同被引文献31

  • 1袁丹,张玉清.网络可生存性定义研究[J].计算机研究与发展,2006,43(z2):525-529. 被引量:6
  • 2林雪纲,许榕生.信息系统生存性分析模型研究[J].通信学报,2006,27(2):153-159. 被引量:11
  • 3Kristensen L M, Christensen S, Jensen K. The Practitioner’s Guide to Coloured Petri Nets[J]. International Journal on Software Tools for Technology Transfer, 1998, 2(2): 98-132.
  • 4Jensen K, Kristensen L M. Coloured Petri Nets: Modeling and Validation of Concurrent Systems[M]. New York, USA: Springer Publishing Company Inc., 2009.
  • 5llison R J, Fisher D A, Linger R C, et al. Survivable Network Systems: An Emerging Discipline[R]. Software Engineering Institute, Carnegie Mellon University, Tech. Rep.: 97-013, 1997.
  • 6Zuo Y, Lande S, Pimple M. Analysis and Simulation of System Survivability[C] //Proc. of the 7th International Conference on Information Technology: New Generations. Washington D. C., USA: IEEE Computer Society, 2010: 36-41.
  • 7张乐君,国林,王巍,杨武,杨永田.网络系统可生存性评估与增强技术研究概述[J].计算机科学,2007,34(8):30-33. 被引量:5
  • 8Ellison R J, Linger R C,Longstaff T, et al. Survivable network system analysis: a case study [ J ]. IEEE Soft- ware, 1999,16(4) :70 - 77.
  • 9Heegaard P E, Trivedi K S. Network survivability modeling J]. Computer Networks:the International Journal of Computer and Telec, ommunications Networ- king ,2009,53 ( 8 ) : 1215 - 1234.
  • 10Cetinkaya E K, Broyles D, Dandekar A, et al. A com- prehensive framework to simulate network attacks and challenges I C]//Proceedings of 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). Moscow, Russia,2010:538 - 544.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部