Sciweavers

Share
JCO
2006

Resource allocation for restoration of compromised systems

8 years 3 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant. In a large scale, the progresses of compromising the networked system and recovering the damagewillcarryoninparallel,allowingservicestobecontinued(atadegradedlevel).Oneof the key problems in the restoration procedure regards to the resource allocation strategies and the cost associated with, specifically, a minimal cost is desired. In this paper we model the cost as a sum of service loss and resource expense that incur during the restoration procedure. We investigate the achievable minimal total cost and corresponding resource allocation strategy for different situations. The situations include both constant rates and time-variant rates in terms of the speed of compromising and recovering. We also consider the fact that the restoration rate is constrained by the resource allocated. The relationship can be ei...
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2006
Where JCO
Authors Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
Comments (0)
books