Formal analysis and improvement of the state transition model for intrusion tolerant system

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion tolerance is an emerging network security technique, which enables the victim server systems to continue offering services (or degraded services) after being attacked. A state transition model has been presented to describe the dynamic behaviors of intrusion tolerant systems. In this paper, we build an attack finite state system based on the recent network attacks, and use SMV, a model checking tool, to analyze the intrusion tolerant systems by the interaction of the system model and the attack model. The analysis results demonstrate that not all types of attacks can be mapped to the system model. We improve this state transition model, whose correctness is proved by SMV. In addition, we give two attack instances mapped to our improved model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Su, K., Zhao, C., Lv, G., Lin, H., & Chen, Q. (2005). Formal analysis and improvement of the state transition model for intrusion tolerant system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3828 LNCS, pp. 391–404). Springer Verlag. https://doi.org/10.1007/11600930_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free