Survivability is the capability of a system to provide its services in a timely manner even after intrusion and compromise occur. In this paper, we focus on the quantitative analysis of survivability of virtual machine (VM) based intrusion tolerant system in the presence of Byzantine failures due to malicious attacks. Intrusion tolerant system has the ability of a system to continuously provide correct services even if the system is intruded. This paper introduces a scheme of the intrusion tolerant system with virtualization, and derives the success probability for one request by a Markov chain under the environment where VMs have been intruded due to a security hole by malicious attacks. Finally, in numerical experiments, we evaluate the performance of VM-based intrusion tolerant system from the viewpoint of survivability.
Junjun ZHENG
Hiroshima University
Hiroyuki OKAMURA
Hiroshima University
Tadashi DOHI
Hiroshima University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Junjun ZHENG, Hiroyuki OKAMURA, Tadashi DOHI, "Survivability Analysis of VM-Based Intrusion Tolerant Systems" in IEICE TRANSACTIONS on Information,
vol. E98-D, no. 12, pp. 2082-2090, December 2015, doi: 10.1587/transinf.2015PAP0007.
Abstract: Survivability is the capability of a system to provide its services in a timely manner even after intrusion and compromise occur. In this paper, we focus on the quantitative analysis of survivability of virtual machine (VM) based intrusion tolerant system in the presence of Byzantine failures due to malicious attacks. Intrusion tolerant system has the ability of a system to continuously provide correct services even if the system is intruded. This paper introduces a scheme of the intrusion tolerant system with virtualization, and derives the success probability for one request by a Markov chain under the environment where VMs have been intruded due to a security hole by malicious attacks. Finally, in numerical experiments, we evaluate the performance of VM-based intrusion tolerant system from the viewpoint of survivability.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2015PAP0007/_p
Copy
@ARTICLE{e98-d_12_2082,
author={Junjun ZHENG, Hiroyuki OKAMURA, Tadashi DOHI, },
journal={IEICE TRANSACTIONS on Information},
title={Survivability Analysis of VM-Based Intrusion Tolerant Systems},
year={2015},
volume={E98-D},
number={12},
pages={2082-2090},
abstract={Survivability is the capability of a system to provide its services in a timely manner even after intrusion and compromise occur. In this paper, we focus on the quantitative analysis of survivability of virtual machine (VM) based intrusion tolerant system in the presence of Byzantine failures due to malicious attacks. Intrusion tolerant system has the ability of a system to continuously provide correct services even if the system is intruded. This paper introduces a scheme of the intrusion tolerant system with virtualization, and derives the success probability for one request by a Markov chain under the environment where VMs have been intruded due to a security hole by malicious attacks. Finally, in numerical experiments, we evaluate the performance of VM-based intrusion tolerant system from the viewpoint of survivability.},
keywords={},
doi={10.1587/transinf.2015PAP0007},
ISSN={1745-1361},
month={December},}
Copy
TY - JOUR
TI - Survivability Analysis of VM-Based Intrusion Tolerant Systems
T2 - IEICE TRANSACTIONS on Information
SP - 2082
EP - 2090
AU - Junjun ZHENG
AU - Hiroyuki OKAMURA
AU - Tadashi DOHI
PY - 2015
DO - 10.1587/transinf.2015PAP0007
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E98-D
IS - 12
JA - IEICE TRANSACTIONS on Information
Y1 - December 2015
AB - Survivability is the capability of a system to provide its services in a timely manner even after intrusion and compromise occur. In this paper, we focus on the quantitative analysis of survivability of virtual machine (VM) based intrusion tolerant system in the presence of Byzantine failures due to malicious attacks. Intrusion tolerant system has the ability of a system to continuously provide correct services even if the system is intruded. This paper introduces a scheme of the intrusion tolerant system with virtualization, and derives the success probability for one request by a Markov chain under the environment where VMs have been intruded due to a security hole by malicious attacks. Finally, in numerical experiments, we evaluate the performance of VM-based intrusion tolerant system from the viewpoint of survivability.
ER -