Network Dependability, Fault-tolerance, Reliability, Security, Survivability: A Framework for Comparative Analysis

A number of qualitative and quantitative terms are used to describe the performance of what has come to be known as information systems, networks or infrastructures. However, some of these terms either have overlapping meanings or contain ambiguities in their definitions presenting problems to those who attempt a rigorous evaluation of the performance of such systems. The phenomenon arises because the wide range of disciplines covered by the term information technology have developed their own distinct terminologies. This paper presents a systematic approach for determining common and complementary characteristics of five widely-used concepts, dependability, fault-tolerance, reliability, security, and survivability. The approach consists of comparing definitions, attributes, and evaluation measures for each of the five concepts and developing corresponding relations. Removing redundancies and clarifying ambiguities will help the mapping of broad user-specified requirements into objective performance parameters for analyzing and designing information infrastructures

[1]  Nancy R. Mead,et al.  Case Study in Survivable Network System Analysis , 1998, ArXiv.

[2]  Rayford B. Vaughn,et al.  Information Security System Rating and Ranking , 2002 .

[3]  Donn B. Parker,et al.  Fighting computer crime - a new framework for protecting information , 1998 .

[4]  Leon Reznik,et al.  Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance? , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[5]  K. Kyamakya,et al.  Security and survivability of distributed systems: an overview , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[6]  Poseidon House,et al.  Building dependable distributed systems , 1994 .

[7]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Peter G. Neumann,et al.  Practical Architectures for Survivable Systems and Networks , 1999 .

[9]  James D. McCabe Practical computer network analysis and design , 1997 .

[10]  E. Orlandi Computer security: a consequence of information technology quality , 1990, IEEE International Carnahan Conference on Security Technology, Crime Countermeasures.

[11]  Niraj K. Jha,et al.  Fault-tolerant computer system design , 1996, IEEE Parallel & Distributed Technology: Systems & Applications.

[12]  H. Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.

[13]  Fred J. Kaudel,et al.  Framework for network survivability performance , 1994, IEEE J. Sel. Areas Commun..

[14]  Brian Randell,et al.  Fundamental Concepts of Dependability , 2000 .

[15]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[16]  David A. Fisher,et al.  Emergent algorithms-a new method for enhancing survivability in unbounded systems , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[17]  Philip Koopman Toward a scalable method for quantifying aspects of fault tolerance, software assurance, and computer security , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).

[18]  J. von Neumann,et al.  Probabilistic Logic and the Synthesis of Reliable Organisms from Unreliable Components , 1956 .

[19]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[20]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.