Skip to main content

Probabilistic Analysis of a System with Illegal Access

  • Conference paper
Software Engineering, Business Continuity, and Education (ASEA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 257))

Abstract

As the Internet has been greatly developed, the demand for improvement of the reliability of the Internet has increased. Recently, there exists a problem in the illegal access which attacks a server intentionally. This paper considers two inspection policies. In Model 1, we assume that illegal access is checked at both random and periodic time. In Model 2, we assume that illegal access is checked by two types of random check. Optimal policies which minimize the expected cost are discussed. Finally, numerical examples are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Miyake, Y.: Attack Detection and Analysis on Internet. The Journal of Institute of Electronics, Information and Communication Engineers 89(4), 313–317 (2006)

    Google Scholar 

  2. Ohta, K., Mansfield, G.: Illegal Access Detection on the Internet -Present status and future directions. Transactions of Institute of Electronics, Information and Communication Engineers J83-B(9), 1209–1216 (2000)

    Google Scholar 

  3. Takei, Y., Ohta, K., Kato, N., Nemoto, Y.: Detecting and Tracing Illegal Access by using Traffic Pattern Matching Technique. Transactions of Institute of Electronics, Information and Communication Engineers J84-B(8), 1464–1473 (2001)

    Google Scholar 

  4. Sawada, A., Takakura, H., Okabe, Y.: A Support System for Monitoring Log Information of IDS Applied to Large Scaled Open Networks. Transactions of Information Processing Society of Japan 44(8), 1861–1871 (2003)

    Google Scholar 

  5. Kanaoka, A., Okamoto, E.: The Problems and Countermeasures of Intrusion Detection Exchange Format in IETF. Transactions of Information Processing Society of Japan 44(8), 1830–1837 (2003)

    Google Scholar 

  6. Ohya, H., Miyaji, R., Kawaguchi, N., Shigeno, H., Okada, K.: A Technique to Reduce False Positives of Network IDS with Machine Learning. Transactions of Information Processing Society of Japan 45(8), 2105–2112 (2004)

    Google Scholar 

  7. Nakagawa, T.: Maintenance Theory of Reliability. Springer, Heidelberg (2005)

    Google Scholar 

  8. Sugiura, T., Miszutani, S., Nakagawa, T.: Optimal random and periodic inspection policies. In: Ninth ISSAT International Conference on Reliability and Quality in Design, pp. 42–45 (2003)

    Google Scholar 

  9. Nakagawa, T., Mizutani, S., Chen, M.: A summary of periodic and random inspection policies. RESS 95, 906–911 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Imaizumi, M., Kimura, M. (2011). Probabilistic Analysis of a System with Illegal Access. In: Kim, Th., et al. Software Engineering, Business Continuity, and Education. ASEA 2011. Communications in Computer and Information Science, vol 257. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27207-3_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27207-3_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27206-6

  • Online ISBN: 978-3-642-27207-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics