Skip to main content

Survivability Computation of Networked Information Systems

  • Conference paper
  • 889 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious environment. As an open complex system, networked information system is presented by a service-oriented hierarchical structure, and fault scenarios are thought of as stimulations that environment impact on systems while changes of system services’ performance as system reaction. Survivability test is done according to a test scheme which is composed of events, atomic missions, fault scenarios and services. Survivability is computed layer by layer based on the result of survivability test through three specifications (resistance, recognition and recovery). This computation method is more practicable than traditional state-based method for it converts direct defining system states and computing state transition into a layered computation process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Louca, S., Pitsillides, A., Samaras, G.: On network survivability algorithms based on trellis graph transformations. In: Proceeding of the 4th IEEE Symposium on Computers and Communications. Red Sea, Egypt., pp. 235–243 (1999)

    Google Scholar 

  2. Guo, Y.B., Ma, J.F.: Quantifying survivability of services in distrusted system. Journal of Tongji University 30, 1190–1193 (2002)

    Google Scholar 

  3. Bao, X.G., Hu, M.Z., Zhang, H.L., Zhang, S.R.: Two survivability quantitative analysis methods for network security management systems. Journal of China Institute of Communications 25, 34–41 (2004)

    Google Scholar 

  4. Jha, S., Wing, J., Linger, R., et al.: Survivability analysis of network specifications. In: International Conference on Dependable Systems and Networks. New York, USA (2000)

    Google Scholar 

  5. Krings, A.W., Azadmanesh, M.H.: A graph based model for survivability analysis. Technical Report, UI-CS-TR-02-024 (2004)

    Google Scholar 

  6. McDermott, J.: Attack-potential-based survivability modeling for high-consequence systems. In: Proceeding of Third IEEE International Workshop on Information Assurance. College Park, Maryland, pp. 23–24 (2005)

    Google Scholar 

  7. Mead, N.R., Ellison, R.J., Longstall, T., et al.: Survivable network analysis method. Technical Report, CMU/SEI-2000-TR-013 (2000)

    Google Scholar 

  8. Lin, X.G., Xu, R.S., Zhu, M.L.: Survivability analysis for information systems. In: Proceeding of the 7th International Conference on Advanced Communication Technology. Phoenix Park, Korea, vol. 1, pp. 255–260 (2005)

    Google Scholar 

  9. Gao, Z.X., Ong, C.H., Tan, W.K.: Survivability assessment: modelling dependencies in information systems. In: Proceedings of the Information Survivability Workshop. Vancouver, BC (2002)

    Google Scholar 

  10. Kim, H.J.: System specification based network modeling for survivability testing simulation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 90–106. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Christie, A.M.: Network survivability analysis using easel. Technical Report, CMU/SEI-2002-TR-039 (2002)

    Google Scholar 

  12. Ellison, R., Fisher, D., Linger, R., et al.: Survivable network systems: an emerging discipline. Technical Report, CMU/SEI-97-153 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, X., Xu, R., Zhu, M. (2005). Survivability Computation of Networked Information Systems. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_59

Download citation

  • DOI: https://doi.org/10.1007/11596981_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics