Evaluating the combined effect of vulnerabilities and faults on large distributed systems

被引:3
作者
Cheminod, M. [1 ]
Bertolotti, I. Cibrario [1 ]
Durante, L. [1 ]
Sisto, R. [2 ]
Valenzano, A. [1 ]
机构
[1] Politecn Torino, IEIIT, CNR, Cso Duca Abruzzi 24, I-10129 Turin, Italy
[2] Politecn Torino, Turin, Italy
来源
DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/DEPCOS-RELCOMEX.2007.22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
On large and complex distributed systems hardware and software faults, as well as vulnerabilities, exhibit significant dependencies and interrelationships. Being able to assess their actual impact on the overall system dependability is especially important. The goal of this paper is to propose a unifying way of describing a complex hardware and software system, in order to assess the impact of both vulnerabilities and faults by means of the same underlying reasoning mechanism, built on a standard Prolog inference engine. Some preliminary experimental results show that a prototype tool based on these techniques is both feasible and able to achieve encouraging performance levels on several synthetic test cases.
引用
收藏
页码:11 / +
页数:2
相关论文
共 13 条
  • [1] Ammann P, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P64
  • [2] Ammann P., 2002, Proceedings of the 9th ACM Conference on Computer and Communications Security, P217, DOI DOI 10.1145/586110.586140
  • [3] [Anonymous], 2001, A taxonomy of computer attacks with applications to wireless networks
  • [4] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [5] BONEH D, 1997, P 15 INT C THEOR APP, V1233, P307
  • [6] Iyer R. K., 2003, Proceedings. Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, P331
  • [7] POWER-HIERARCHY OF DEPENDABILITY-MODEL TYPES
    MALHOTRA, M
    TRIVEDI, KS
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 1994, 43 (03) : 493 - 502
  • [8] Ou XM, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P113
  • [9] Ramakrishnan C. R., 2002, Journal of Computer Security, V10, P189
  • [10] Using model checking to analyze network vulnerabilities
    Ritchey, RW
    Ammann, P
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 156 - 165