Skip to main content

Probabilistic Analysis of Operational Security for Network Systems

  • Conference paper
Information Processing and Security Systems
  • 524 Accesses

Abstract

Survivability is the ability of system to continue operating in the presence of failures or malicious attacks [4]. We present an original method for performing probabilistic analysis of survivability of network systems. We can simulate failures and intrusion events in our method and then observe the effects of the injected events. Our model is based on Markov Decision Processes which are generalization of Markov Chains and provides the analysis of probabilistic measures for network systems, such us: probability that a service that has been issued will be finished or the expected time it takes a service to finish. We illustrate the idea of our technigues by a simply example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5 References

  1. Altman E., “Constraint Markov Decision Processes”, Champan and Hall, 1998

    Google Scholar 

  2. Clarke E. M., Grumberg O., Peled D, “Model checking”, MIT Press, 2000

    Google Scholar 

  3. Courcoubetis C., Yannakakis M., “The complexity of probabilistic verification”, Journal of ACM, 42(4), pp. 857–907, 1995

    Article  MathSciNet  Google Scholar 

  4. Ellison R., Fisher D., Linger R., Longstaff T., Mead N., “Survivability network system analysis: A case study”, IEEE Software 16/4, pp. 307–317, 1999

    Article  Google Scholar 

  5. Farmer D., Spafford E., “The cops security checker system”, Proceedings Summer Usenix Conference, 1995

    Google Scholar 

  6. Ortalo R., Deswarte Y., Kaaniche M., “Experimenting with quantitative evaluation tools for monitoring operational security”, IEEE Transactions on Software Engineering, 25/5, pp. 633–650, 1999

    Article  Google Scholar 

  7. Koszelew J., “Some methods for verification of probabilistic programs interpreted in finite structures”, Computer information systems and industrial management applications: CISIM'03. WSFiZ, pp. 140–147, 2003

    Google Scholar 

  8. Pearl J., “Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference”, Morgan Kaufmann, 1998

    Google Scholar 

  9. Pnueli A., “A temporal logic of concurrent programs”, Theoretical Comput. Sci., 13, pp. 45–60, 1980

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this paper

Cite this paper

Koszelew, J. (2005). Probabilistic Analysis of Operational Security for Network Systems. In: Saeed, K., Pejaś, J. (eds) Information Processing and Security Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-26325-X_24

Download citation

  • DOI: https://doi.org/10.1007/0-387-26325-X_24

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-25091-5

  • Online ISBN: 978-0-387-26325-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics