|Title||Characterizing intrusion tolerant systems using a state transition model|
|Publication Type||Conference Paper|
|Year of Publication||2001|
|Authors||K Goševa-Popstojanova, F Wang, R Wang, F Gong, K Vaidyanathan, K Trivedi, and B Muthusamy|
|Conference Name||Proceedings Darpa Information Survivability Conference and Exposition Ii, Discex 2001|
© 2001 IEEE. Intrusion detection and response research has so far mostly concentrated on known and well-defined attacks. We believe that this narrow focus of attacks accounts for both the successes and limitation of commercial intrusion detection systems (IDS). Intrusion tolerance, on the other hand, is inherently tied to functions and services that require protection. This paper presents a state transition model to describe the dynamic behavior of intrusion-tolerant systems. This model provides a framework from which we can define the vulnerability and the threat set to be addressed. We also show how this model helps us to describe both known and unknown security exploits by focusing on impacts rather than specific attack procedures. By going through the exercise of mapping known vulnerabilities to this transition model, we identify a reasonably complete fault space that should be considered in a general intrusion-tolerant system.