Resource allocation for restoration of compromised systems |
| |
Authors: | Qunwei Zheng Sibabrata Ray Xiaoyan Hong |
| |
Affiliation: | (1) Department of Computer Science, University of Alabama, Box 870290, Tuscaloosa, AL, 35487-0290 |
| |
Abstract: | Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today’s networked systems are thus built to be intrusion tolerant. In a large scale, the progresses of compromising the networked system and recovering the damage will carry on in parallel, allowing services to be continued (at a degraded level). One of the key problems in the restoration procedure regards to the resource allocation strategies and the cost associated with, specifically, a minimal cost is desired. In this paper we model the cost as a sum of service loss and resource expense that incur during the restoration procedure. We investigate the achievable minimal total cost and corresponding resource allocation strategy for different situations. The situations include both constant rates and time-variant rates in terms of the speed of compromising and recovering. We also consider the fact that the restoration rate is constrained by the resource allocated. The relationship can be either linear or obeying the law of diminishing marginal utility. We present both analytical and numerical results in the paper. The results show the impact from various system parameters on the critical conditions for a successful system restoration and on the minimal cost. Dr. Ray is currently with Google Inc., 604 Arizona Avenue, Santa Monica, CA 90401, USA. His e-mail contact is sibu@google.com, siburay@gmail.com |
| |
Keywords: | Cost analysis Intrusion tolerance Resource allocation System restoration Internet worm |
本文献已被 SpringerLink 等数据库收录! |
|