Survivability of Network Information System: An Overview

Society has become so dependent on information systems that provide the information underpinnings for critical infrastructure applications. With the development of network technology, these systems continue to emerge and grow, and have become unbounded networked systems that are highly distributed. But traditional security technology is not sufficient to deal with the protection and survivability of highly distributed information systems operating in unbounded networks ¿Survivability research is the key to resolve the problem. This paper organizes and summarizes the current literatures and presents an overview of survivability research by discussing the definition, the various techniques and the estimate models of survivability, and finally, presents a conclusion and future work.

[1]  Nancy R. Mead,et al.  Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.

[2]  Ivar Jacobson,et al.  The Unified Modeling Language User Guide , 1998, J. Database Manag..

[3]  Joon S. Park,et al.  Static vs. dynamic recovery models for survivable distributed systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[4]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[5]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[6]  Vickie R. Westmark A definition for information system survivability , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[7]  Deep Medhi,et al.  Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[8]  Nancy R. Mead,et al.  Survivable Network System Analysis: A Case Study , 1999, IEEE Softw..

[9]  Stephanie Forrest,et al.  Information Immune Systems , 2003, Genetic Programming and Evolvable Machines.

[10]  Kevin J. Sullivan,et al.  Towards a rigorous definition of information system survivability , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[11]  Tang Hui-lin Research on survivability analysis of network system , 2007 .

[12]  Jeffrey O. Kephart,et al.  Blueprint for a Computer Immune System , 1999 .

[13]  William L. Fithen,et al.  State of the Practice of Intrusion Detection Technologies , 2000 .

[14]  Matti A. Hiltunen,et al.  Survivability through customization and adaptability: the Cactus approach , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[15]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[16]  N. Hanebutte,et al.  Low-Level Network Attack Recognition : A Signature-Based Approach ∗ , 2001 .

[17]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[18]  Thomas Spyrou,et al.  Intention modelling: approximating computer user intentions for detection and prediction of intrusions , 1996, SEC.