Browse > Article

Survivability Assessment using DMKB for IT infrastructure  

Choi Eun-Jung (서울여자대학교 정보통신교육원)
Kim Myuhng-Joo (서울여자대학교 정보보호학)
Abstract
The popularization of high-speed networks and the innovation of high-performance hardware/servers have enlarged the role of large-scale, highly distributed IT infrastructure. Though many criteria on the assessment of IT infrastructure can be considered, the survivability assessment is treated as the most important one due to the essential role as an infrastructure. While assessing the survivability of some given IT infrastructures, we can not only choose the best one among them but also improve their survivability by modifying their structure and security policies. In this paper, we propose a DMKB-based assessment system on the survivability of IT infrastructures, where DMKB is a kind of database which provides the known vulnerabilities and defense mechanism for many system components.
Keywords
IT infrastructure; Survivability Assessment; System & Network Security; DMKB;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. F. Lipson, D. A. Fisher, 'Survivability - A New Technical and Business Perspective on Security,' Proceedings of the 1999 New Security Paradigms Workshop. Caledon Hill, ON, September 21-24, 1999. New York, NY: Association for Computer Machinery, 2000   DOI
2 S. Jha and J. M. Wing., 'Survivability Analysis of Networked Systems,' Proceedings of the 23rd International Conference on Software Engineering (ICSE2000), pages 307-317, 2001
3 R. C. Linger, A. P. Moore, 'Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,' Technical Report CMU/SEI-20001-TR-029, Carnegie Mellon University, Pittsburgh, PA 15213,October 2001
4 Jaynarayan H. Lala, 'Information Assurance and Survivability,' International Conference on Dependable Systems and Networks, NY, USA, June 25-28, 2000
5 Dale M. Johnson and Ph.D.Doug Williams, Ph.D., 'Organically Assured and Survivable Information Systems (OASIS),' MITRE Technology Symposium, Washington, June 2002
6 R. J. Ellison and D. A. Fisher and R. C. Linger and H. F. Lipson and T. Longstaff and N. R. Mead, 'Survivable Network Systems: An Emer-ging Discipline,' CERT, November 1997 Revised: May 1999, CMU/SEI-97-TR-013
7 Richard C. Linger and Andrew P. Moore, 'Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models,' CERT, CMU/SEI-2001-TR-029, October 2001
8 M. Bishop: Vulnerabilities Analysis. Proceedings of the Recent Advances in Intrusion Detection, (1999)
9 R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, 'Survivable network systems: An emerging discipline,' Technical Report CMU/SEI-97-153, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213, November 1997
10 D. A. Fisher and H.F. Lipson, 'Emergent Algorithms - A New Method for Enhancing Survivability in Unbounded Systems,' Proceedings of the 32nd Annual Hawaii International Conference on System Sciences, Maui, Hawaii, January 5-8, 1999 (HICSS-32), IEEE Computer Society, 1999   DOI
11 J. H. Lala, 'Introduction,' Proceeding of the Foundation of Intrusion Tolerant System (OASIS'03), IEEE Computer Society, 2003
12 Eun-Jung Choi, Hyung-Jong Kim, Myuhng-Joo Kim, 'DMKB : A Defense Mechanism Knowledge Base,' International Conference ICCSA, May 2004, Assisi Italy, LNCS 3043 2004   DOI