Nonlinear Resource Allocation in Restoration of Compromised Systems

Under security threats, today's networks are being made to be intrusion tolerant. In a large scale, services are continuing (at a degraded level) while compromising and recovering are both progressing. One of the key problems in the restoration procedure regards to the resource allocation strategies, typically a minimized total cost concerning both service loss and resource expense. In this paper, we investigate the achievable minimal total cost and corresponding resource allocation strategy for different situations. The situations include nonlinear relationship between resource allocation rate and the restoration rate, and its variant when time factor is concerned. We present cost models and numerical results. The results show the impact from various system parameters on the critical conditions for a successful system restoration and the minimal cost. An important result of our study suggests that tight operational region exists under certain conditions.

[1]  Miguel Correia,et al.  Intrusion-Tolerant Architectures: Concepts and Design , 2002, WADS.

[2]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[3]  Jaynarayan H. Lala,et al.  Foundations of Intrusion Tolerant Systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[4]  Catherine A. Meadows,et al.  A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..

[5]  W. Baumol,et al.  Economics--principles and policy , 1979 .

[6]  Michael Grüninger,et al.  Introduction , 2002, CACM.

[7]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[8]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.