Title
Vulnerability modeling and simulation for DNS intrusion tolerance system construction
Abstract
To construct the ITS(Intrusion Tolerance System), we should concern not only the FTS(Fault Tolerant System) requirements but also intrusion and vulnerability factors. But, in the ITS, we can not take into account the intrusion and vulnerability as they are, because the characteristics and pattern of them is unknown. So, we suggest vulnerability analysis method that enable ITS to know the pattern of vulnerability exploitation more specifically. We make use of the atomic vulnerability concept to analyze the vulnerability in DNS system, and show how to make use of the analysis result as monitoring factors in our DNS ITS system. Also, this analysis result is used in modeling and simulation to see the dynamics of computer network for vulnerability and external malicious attack. This paper shows simulation execution examples making use of the vulnerability analysis result.
Year
DOI
Venue
2004
10.1007/978-3-540-30583-5_9
AIS
Keywords
Field
DocType
vulnerability modeling,analysis result,atomic vulnerability concept,dns system,vulnerability analysis result,vulnerability factor,vulnerability analysis method,vulnerability exploitation,dns intrusion tolerance system,intrusion tolerance system,simulation execution example,fault tolerant system,vulnerability analysis,computer network,modeling and simulation,intrusion tolerance,dns
Intrusion,Vulnerability assessment,Computer science,Modeling and simulation,Computer security,Fault tolerance,System construction,Intrusion tolerance,Vulnerability management,Vulnerability,Distributed computing
Conference
Volume
ISSN
ISBN
3397
0302-9743
3-540-24476-X
Citations 
PageRank 
References 
7
1.04
7
Authors
1
Name
Order
Citations
PageRank
Hyung-Jong Kim127827.13