Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction

  • Hyung-Jong Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3397)


To construct the ITS(Intrusion Tolerance System), we should concern not only the FTS(Fault Tolerant System) requirements but also intrusion and vulnerability factors. But, in the ITS, we can not take into account the intrusion and vulnerability as they are, because the characteristics and pattern of them is unknown. So, we suggest vulnerability analysis method that enable ITS to know the pattern of vulnerability exploitation more specifically. We make use of the atomic vulnerability concept to analyze the vulnerability in DNS system, and show how to make use of the analysis result as monitoring factors in our DNS ITS system. Also, this analysis result is used in modeling and simulation to see the dynamics of computer network for vulnerability and external malicious attack. This paper shows simulation execution examples making use of the vulnerability analysis result.


Vulnerability Analysis Intrusion Tolerance DEVS formalism Atomic Vulnerability DNS 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mead, N.R., et al.: Survivable Network Analysis Method, CMU/SEI-2000-TR-013 (September 2000)Google Scholar
  2. 2.
    Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A., Mead, N.R.: Survivability: Protecting Your Critical Systems. IEEE Internet Computing 3, 55–63 (1999)CrossRefGoogle Scholar
  3. 3.
    Cohen, F.: Simulating Cyber Attacks, Defenses, and Consequences. Computer & Security 18, 479–518 (1999)CrossRefGoogle Scholar
  4. 4.
    Bishop, M.: Vulnerabilities Analysis. In: Proceedings of the Recent Advances in Intrusion Detection, pp. 125–136 (September 1999)Google Scholar
  5. 5.
    Ye, N., Giordano, J.: CACA - A Process Control Approach to Cyber Attack Detection. Communications of the ACM 44(8), 76–82 (2001)CrossRefGoogle Scholar
  6. 6.
    Kim, H., Ko, K., Shin, D., Kim, H.: Vulnerability assessment simulation for information infrastructure protection. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002, vol. 2437, p. 145. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Kim, H.: System specification based network modeling for survivability testing simulation. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002, vol. 2587, pp. 90–106. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Cho, T., Kim, H.: DEVS Simulation of Distributed Intrusion Detection System. Transactions of the Society for Computer Simulation International 18(3), 133–146 (2001)Google Scholar
  9. 9.
    Zeigler, B.P., Praehofer, H., Kim, T.: Theory of Modeling and Simulation, 2nd edn. Academic Press, London (2000)Google Scholar
  10. 10.
    Zeigler, B.P.: Object-Oriented Simulation with Hierarchical, Modular Models. Academic Press, San Diego (1990)zbMATHGoogle Scholar
  11. 11.
    Adelsbach, A., et al.: Conceptual Model and Architecture of MAFTIA . Project MAFTIA IST-1999-11583 deliverable D21 (2002)Google Scholar
  12. 12.
    Cukier, M., Lyons, J., et al.: Intrusion Tolerance Approaches in ITUA. In: FastAbstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, Göteborg, Sweden, July 1-4, pp. B-64–B-65(2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hyung-Jong Kim
    • 1
  1. 1.Korea Information Security Agency(KISA)SeoulKorea

Personalised recommendations