Skip to main content

Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction

  • Conference paper
Artificial Intelligence and Simulation (AIS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3397))

  • 1212 Accesses

Abstract

To construct the ITS(Intrusion Tolerance System), we should concern not only the FTS(Fault Tolerant System) requirements but also intrusion and vulnerability factors. But, in the ITS, we can not take into account the intrusion and vulnerability as they are, because the characteristics and pattern of them is unknown. So, we suggest vulnerability analysis method that enable ITS to know the pattern of vulnerability exploitation more specifically. We make use of the atomic vulnerability concept to analyze the vulnerability in DNS system, and show how to make use of the analysis result as monitoring factors in our DNS ITS system. Also, this analysis result is used in modeling and simulation to see the dynamics of computer network for vulnerability and external malicious attack. This paper shows simulation execution examples making use of the vulnerability analysis result.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mead, N.R., et al.: Survivable Network Analysis Method, CMU/SEI-2000-TR-013 (September 2000)

    Google Scholar 

  2. Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A., Mead, N.R.: Survivability: Protecting Your Critical Systems. IEEE Internet Computing 3, 55–63 (1999)

    Article  Google Scholar 

  3. Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. Computer & Security 18, 479–518 (1999)

    Article  Google Scholar 

  4. Bishop, M.: Vulnerabilities Analysis. In: Proceedings of the Recent Advances in Intrusion Detection, pp. 125–136 (September 1999)

    Google Scholar 

  5. Ye, N., Giordano, J.: CACA - A Process Control Approach to Cyber Attack Detection. Communications of the ACM 44(8), 76–82 (2001)

    Article  Google Scholar 

  6. Kim, H., Ko, K., Shin, D., Kim, H.: Vulnerability assessment simulation for information infrastructure protection. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002, vol. 2437, p. 145. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Kim, H.: System specification based network modeling for survivability testing simulation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002, vol. 2587, pp. 90–106. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Cho, T., Kim, H.: DEVS Simulation of Distributed Intrusion Detection System. Transactions of the Society for Computer Simulation International 18(3), 133–146 (2001)

    Google Scholar 

  9. Zeigler, B.P., Praehofer, H., Kim, T.: Theory of Modeling and Simulation, 2nd edn. Academic Press, London (2000)

    Google Scholar 

  10. Zeigler, B.P.: Object-Oriented Simulation with Hierarchical, Modular Models. Academic Press, San Diego (1990)

    MATH  Google Scholar 

  11. Adelsbach, A., et al.: Conceptual Model and Architecture of MAFTIA . Project MAFTIA IST-1999-11583 deliverable D21 (2002)

    Google Scholar 

  12. Cukier, M., Lyons, J., et al.: Intrusion Tolerance Approaches in ITUA. In: FastAbstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, Göteborg, Sweden, July 1-4, pp. B-64–B-65(2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HJ. (2005). Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction. In: Kim, T.G. (eds) Artificial Intelligence and Simulation. AIS 2004. Lecture Notes in Computer Science(), vol 3397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30583-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30583-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24476-9

  • Online ISBN: 978-3-540-30583-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics