Publication | Closed Access
Model-based validation of an intrusion-tolerant information system
65
Citations
10
References
2004
Year
Unknown Venue
EngineeringSurvivable SystemInformation SecuritySurvivability RequirementsVerificationSoftware AnalysisFormal VerificationHardware SecuritySecurity ModellingSystems EngineeringComputer SystemsModel-based Validation EffortIntrusion Detection SystemIntrusion ToleranceComputer ScienceData SecurityFormal MethodsModel-based ValidationSecurity MeasurementComputer Security Model
An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where attackers typically seek to degrade quality of service by intrusions that exploit vulnerabilities in networks, operating systems, and application software. Accordingly, designers are seeking improved techniques for validating such systems with respect to specified survivability requirements. In this regard, we describe a model-based validation effort that was undertaken as part of a unified approach to validating a networked intrusion-tolerant information system. Model-based results were used to guide the system's design as well as to determine whether a given survivability requirement was satisfied.
| Year | Citations | |
|---|---|---|
Page 1
Page 1