Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004. 2004
DOI: 10.1109/reldis.2004.1353019
|View full text |Cite
|
Sign up to set email alerts
|

Model-based validation of an intrusion-tolerant information system

Abstract: An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where attackers typically seek to degrade quality of service by intrusions that exploit vulnerabilities in networks, operating systems, and application software. Accordingly, designers are seeking improved techniques for validating such systems with respect to spe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(16 citation statements)
references
References 14 publications
(13 reference statements)
0
14
0
2
Order By: Relevance
“…Similar metrics of security, such as the Mean Time To Detection (of a security vulnerability), abreviated by MTTD, and the Mean Time To Exploitation (of a security vulnerability), abbreviated by MTTE, have also been proposed [12]. In this paper we submit a tentative challenge to these metrics, by highlighting their shortcomings and suggesting appropriate remedies.…”
Section: Challenging the Mean Time To Failurementioning
confidence: 98%
“…Similar metrics of security, such as the Mean Time To Detection (of a security vulnerability), abreviated by MTTD, and the Mean Time To Exploitation (of a security vulnerability), abbreviated by MTTE, have also been proposed [12]. In this paper we submit a tentative challenge to these metrics, by highlighting their shortcomings and suggesting appropriate remedies.…”
Section: Challenging the Mean Time To Failurementioning
confidence: 98%
“…Also, measuring the indicator level may be subjective. Other researchers have taken different approaches such as agent-based [13,14], model-based [15,16], and attack-scenario-based [17] evaluation. Even though these approaches demonstrated interesting evaluation results, their work omitted real use cases.…”
Section: Validation Approaches In the Smart Gridmentioning
confidence: 99%
“…Also, measuring the indicator level may be subjective. Other researchers have taken different approaches such as agent-based [17,22], model-based [24,21], and attack-scenario-based [16]. Even though these approaches demonstrated interesting evaluation results, their work omitted real use cases.…”
Section: Figure 1 Simulation-based Validation Frameworkmentioning
confidence: 99%