Intrusion tolerance is an emerging network security technique, which enables the victim server systems to continue offering services (or degraded services) after being attacked. A state transition model has been presented to describe the dynamic behaviors of intrusion tolerant systems. In this paper, we build an attack finite state system based on the recent network attacks, and use SMV, a model checking tool, to analyze the intrusion tolerant systems by the interaction of the system model and the attack model. The analysis results demonstrate that not all types of attacks can be mapped to the system model. We improve this state transition model, whose correctness is proved by SMV. In addition, we give two attack instances mapped to our improved model. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Su, K., Zhao, C., Lv, G., Lin, H., & Chen, Q. (2005). Formal analysis and improvement of the state transition model for intrusion tolerant system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3828 LNCS, pp. 391–404). Springer Verlag. https://doi.org/10.1007/11600930_39
Mendeley helps you to discover research relevant for your work.