Abstract
As the Internet has been greatly developed, the demand for improvement of the reliability of the Internet has increased. Recently, there exists a problem in the illegal access which attacks a server intentionally. This paper considers two inspection policies. In Model 1, we assume that illegal access is checked at both random and periodic time. In Model 2, we assume that illegal access is checked by two types of random check. Optimal policies which minimize the expected cost are discussed. Finally, numerical examples are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Miyake, Y.: Attack Detection and Analysis on Internet. The Journal of Institute of Electronics, Information and Communication Engineers 89(4), 313–317 (2006)
Ohta, K., Mansfield, G.: Illegal Access Detection on the Internet -Present status and future directions. Transactions of Institute of Electronics, Information and Communication Engineers J83-B(9), 1209–1216 (2000)
Takei, Y., Ohta, K., Kato, N., Nemoto, Y.: Detecting and Tracing Illegal Access by using Traffic Pattern Matching Technique. Transactions of Institute of Electronics, Information and Communication Engineers J84-B(8), 1464–1473 (2001)
Sawada, A., Takakura, H., Okabe, Y.: A Support System for Monitoring Log Information of IDS Applied to Large Scaled Open Networks. Transactions of Information Processing Society of Japan 44(8), 1861–1871 (2003)
Kanaoka, A., Okamoto, E.: The Problems and Countermeasures of Intrusion Detection Exchange Format in IETF. Transactions of Information Processing Society of Japan 44(8), 1830–1837 (2003)
Ohya, H., Miyaji, R., Kawaguchi, N., Shigeno, H., Okada, K.: A Technique to Reduce False Positives of Network IDS with Machine Learning. Transactions of Information Processing Society of Japan 45(8), 2105–2112 (2004)
Nakagawa, T.: Maintenance Theory of Reliability. Springer, Heidelberg (2005)
Sugiura, T., Miszutani, S., Nakagawa, T.: Optimal random and periodic inspection policies. In: Ninth ISSAT International Conference on Reliability and Quality in Design, pp. 42–45 (2003)
Nakagawa, T., Mizutani, S., Chen, M.: A summary of periodic and random inspection policies. RESS 95, 906–911 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Imaizumi, M., Kimura, M. (2011). Probabilistic Analysis of a System with Illegal Access. In: Kim, Th., et al. Software Engineering, Business Continuity, and Education. ASEA 2011. Communications in Computer and Information Science, vol 257. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27207-3_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-27207-3_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27206-6
Online ISBN: 978-3-642-27207-3
eBook Packages: Computer ScienceComputer Science (R0)