On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions

Intrusion tolerance Replication Resilience
DOI: 10.1007/s13173-012-0062-x Publication Date: 2012-02-29T08:58:38Z
ABSTRACT
Abstract This paper considers the estimation of reliability and availability intrusion-tolerant systems subject to non-detectable intrusions caused by stealth attacks. We observe that typical intrusion tolerance techniques may in certain circumstances worsen dependability properties they were meant improve. model as a probabilistic effect adversarial efforts analyze different strategies attack rejuvenation. compare several configurations replication proactive rejuvenation, varying mission times expected node-intrusion. In doing so, we identify thresholds distinguish between improvement degradation dependability, with focus on security. highlight complementarity showing improvements resilience not attainable any alone, but possible when are combined. advocate need for thorougher system models, vulnerabilities arising from incomplete specifications.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (28)
CITATIONS (9)