Skip to:Content
|
Bottom
Cover image for Secure computer and network systems : modeling, analysis and design
Title:
Secure computer and network systems : modeling, analysis and design
Personal Author:
Publication Information:
Chichester, England ; Hoboken, NJ : J. Wiley & Sons, 2008
Physical Description:
xvii, 336 p. : ill. ; 26 cm.
ISBN:
9780470023242

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010189912 TK5105.59 Y464 2008 Open Access Book Book
Searching...
Searching...
30000010191413 TK5105.59 Y464 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.

This book presents quantitative modeling and analysis techniques to address these numerous challenges in cyber attack prevention and detection for security and QoS, including:

the latest research on computer and network behavior under attack and normal use conditions; new design principles and algorithms, which can be used by engineers and practitioners to build secure computer and network systems, enhance security practice and move to providing QoS assurance on the Internet; mathematical and statistical methods for achieving the accuracy and timeliness of cyber attack detection with the lowest computational overhead; guidance on managing admission control, scheduling, reservation and service of computer and network jobs to assure the service stability and end-to-end delay of those jobs even under Denial of Service attacks or abrupt demands.

Secure Computer and Network Systems: Modeling, Analysis and Design is an up-to-date resource for practising engineers and researchers involved in security, reliability and quality management of computer and network systems. It is also a must-read for postgraduate students developing advanced technologies for improving computer network dependability.


Author Notes

Professor Ye received her Ph.D. degree (1991) in Industrial Engineering from Purdue University, West Lafayette, Indiana, and holds MS (1988) and BS (1985) degrees in Computer Science. With her multi-disciplinary educational background, Dr. Ye has devoted her academic career to establishing the scientific and engineering foundation for assuring quality/reliability of information systems and industrial systems.


Table of Contents

Prefacep. xi
Part I An Overview of Computer and Network Security
1 Assets, vulnerabilities and threats of computer and network systemsp. 3
1.1 Risk assessmentp. 3
1.2 Assets and asset attributesp. 4
1.2.1 Resource, process and user assets and their interactionsp. 5
1.2.2 Cause-effect chain of activity, state and performancep. 6
1.2.3 Asset attributesp. 8
1.3 Vulnerabilitiesp. 11
1.3.1 Boundary condition errorp. 12
1.3.2 Access validation error and origin validation errorp. 12
1.3.3 Input validation errorp. 13
1.3.4 Failure to handle exceptional conditionsp. 13
1.3.5 Synchronization errorsp. 13
1.3.6 Environment errorp. 13
1.3.7 Configuration errorp. 14
1.3.8 Design errorp. 14
1.3.9 Unknown errorp. 15
1.4 Threatsp. 15
1.4.1 Objective, origin, speed and means of threatsp. 15
1.4.2 Attack stagesp. 21
1.5 Asset risk frameworkp. 21
1.6 Summaryp. 22
Referencesp. 23
2 Protection of computer and network systemsp. 25
2.1 Cyber attack preventionp. 25
2.1.1 Access and flow controlp. 25
2.1.2 Secure computer and network designp. 29
2.2 Cyber attack detectionp. 29
2.2.1 Data, events and incidentsp. 30
2.2.2 Detectionp. 31
2.2.3 Assessmentp. 32
2.3 Cyber attack responsep. 32
2.4 Summaryp. 33
Referencesp. 33
Part II Secure System Architecture and Design
3 Asset protection-driven, policy-based security protection architecturep. 39
3.1 Limitations of a threat-driven security protection paradigmp. 39
3.2 A new, asset protection-driven paradigm of security protectionp. 40
3.2.1 Data to monitor: assets and asset attributesp. 41
3.2.2 Events to detect: mismatches of asset attributesp. 41
3.2.3 Incidents to analyze and respond: cause-effect chains of mismatch eventsp. 42
3.2.4 Proactive asset protection against vulnerabilitiesp. 42
3.3 Digital security policies and policy-based security protectionp. 43
3.3.1 Digital security policiesp. 43
3.3.2 Policy-based security protectionp. 45
3.4 Enabling architecture and methodologyp. 46
3.4.1 An Asset Protection Driven Security Architecture (APDSA)p. 46
3.4.2 An Inside-Out and Outside-In (IOOI) methodology of gaining knowledge about data, events and incidentsp. 47
3.5 Further research issuesp. 48
3.5.1 Technologies of asset attribute data acquisitionp. 48
3.5.2 Quantitative measures of asset attribute data and mismatch eventsp. 48
3.5.3 Technologies for automated monitoring, detection, analysis and control of data, events, incidents and COAp. 49
3.6 Summaryp. 49
Referencesp. 50
4 Job admission control for service stabilityp. 53
4.1 A token bucket method of admission control in DiffServ and InteServ modelsp. 53
4.2 Batch Scheduled Admission Control (BSAC) for service stabilityp. 55
4.2.1 Service stability in service reservation for instantaneous jobsp. 56
4.2.2 Description of BSACp. 57
4.2.3 Performance advantage of the BSAC router model over a regular router modelp. 60
4.3 Summaryp. 64
Referencesp. 64
5 Job scheduling methods for service differentiation and service stabilityp. 65
5.1 Job scheduling methods for service differentiationp. 65
5.1.1 Weighted Shortest Processing Time (WSPT), Earliest Due Date (EDD) and Simplified Apparent Tardiness Cost (SATC)p. 65
5.1.2 Comparison of WSPT, ATC and EDD with FIFO in the best effort model and in the DiffServ model in service differentiationp. 66
5.2 Job scheduling methods for service stabilityp. 70
5.2.1 Weighted Shortest Processing Time - Adjusted (WSPT-A) and its performance in service stabilityp. 70
5.2.2 Verified Spiral (VS) and Balanced Spiral (BS) methods for a single service resource and their performance in service stabilityp. 73
5.2.3 Dynamics Verified Spiral (DVS) and Dynamic Balanced Spiral (DBS) methods for parallel identical resources and their performance in service stabilityp. 78
5.3 Summaryp. 79
Referencesp. 79
6 Job reservation and service protocols for end-to-end delay guaranteep. 81
6.1 Job reservation and service in InteServ and RSVPp. 81
6.2 Job reservation and service in I-RSVPp. 82
6.3 Job reservation and service in SI-RSVPp. 86
6.4 Service performance of I-RSVP and SI-RSVP in comparison with the best effort modelp. 89
6.4.1 The simulation of a small-scale computer network with I-RSVP, SI-RSVP and the best effort modelp. 89
6.4.2 The simulation of a large-scale computer network with I-RSVP, SI-RSVP and the best effort modelp. 91
6.4.3 Service performance of I-RSVP, SI-RSVP and the best effort modelp. 93
6.5 Summaryp. 102
Referencesp. 103
Part III Mathematical/Statistical Features and Characteristics of Attack and Normal Use Data
7 Collection of Windows performance objects data under attack and normal use conditionsp. 107
7.1 Windows performance objects datap. 107
7.2 Description of attacks and normal use activitiesp. 111
7.2.1 Apache Resource DoSp. 111
7.2.2 ARP Poisonp. 111
7.2.3 Distributed DoSp. 112
7.2.4 Fork Bombp. 113
7.2.5 FTP Buffer Overflowp. 113
7.2.6 Hardware Keyloggerp. 113
7.2.7 Remote Dictionaryp. 113
7.2.8 Rootkitp. 113
7.2.9 Security Auditp. 114
7.2.10 Software Keyloggerp. 114
7.2.11 Vulnerability Scanp. 114
7.2.12 Text Editingp. 114
7.2.13 Web Browsingp. 114
7.3 Computer network setup for data collectionp. 115
7.4 Procedure of data collectionp. 115
7.5 Summaryp. 118
Referencesp. 118
8 Mean shift characteristics of attack and normal use datap. 119
8.1 The mean feature of data and two-sample test of mean differencep. 119
8.2 Data pre-processingp. 121
8.3 Discovering mean shift data characteristics for attacksp. 121
8.4 Mean shift attack characteristicsp. 122
8.4.1 Examples of mean shift attack characteristicsp. 122
8.4.2 Mean shift attack characteristics by attacks and windows performance objectsp. 124
8.4.3 Attack groupings based on the same and opposite attack characteristicsp. 128
8.4.4 Unique attack characteristicsp. 136
8.5 Summaryp. 139
Referencesp. 139
9 Probability distribution change characteristics of attack and normal use datap. 141
9.1 Observation of data patternsp. 141
9.2 Skewness and mode tests to identify five types of probability distributionsp. 146
9.3 Procedure for discovering probability distribution change data characteristics for attacksp. 148
9.4 Distribution change attack characteristicsp. 150
9.4.1 Percentages of the probability distributions under the attack and normal use conditionsp. 150
9.4.2 Examples of distribution change attack characteristicsp. 151
9.4.3 Distribution change attack characteristics by attacks and Windows performance objectsp. 151
9.4.4 Attack groupings based on the same and opposite attack characteristicsp. 161
9.4.5 Unique attack characteristicsp. 167
9.5 Summaryp. 173
Referencesp. 174
10 Autocorrelation change characteristics of attack and normal use datap. 175
10.1 The autocorrelation feature of datap. 175
10.2 Discovering the autocorrelation change characteristics for attacksp. 176
10.3 Autocorrelation change attack characteristicsp. 178
10.3.1 Percentages of variables with three autocorrelation levels under the attack and normal use conditionsp. 178
10.3.2 Examples of autocorrelation change attack characteristicsp. 179
10.3.3 Autocorrelation change attack characteristics by attacks and Windows performance objectsp. 182
10.3.4 Attack groupings based on the same and opposite attack characteristicsp. 182
10.3.5 Unique attack characteristicsp. 193
10.4 Summaryp. 193
Referencesp. 196
11 Wavelet change characteristics of attack and normal use datap. 197
11.1 The wavelet feature of datap. 197
11.2 Discovering the wavelet change characteristics for attacksp. 201
11.3 Wave change attack characteristicsp. 203
11.3.1 Examples of wavelet change attack characteristicsp. 203
11.3.2 Wavelet change attack characteristics by attacks and Windows performance objectsp. 204
11.3.3 Attack groupings based on the same and opposite attack characteristicsp. 222
11.3.4 Unique attack characteristicsp. 225
11.4 Summaryp. 243
Referencesp. 243
Part IV Cyber Attack Detection: Signature Recognition
12 Clustering and classifying attack and normal use datap. 247
12.1 Clustering and Classification Algorithm - Supervised (CCAS)p. 248
12.2 Training and testing datap. 251
12.3 Application of CCAS to cyber attack detectionp. 251
12.4 Detection performance of CCASp. 253
12.5 Summaryp. 256
Referencesp. 256
13 Learning and recognizing attack signatures using artificial neural networksp. 257
13.1 The structure and back-propagation learning algorithm of feedforward ANNsp. 257
13.2 The ANN application to cyber attack detectionp. 260
13.3 Summaryp. 270
Referencesp. 271
Part V Cyber Attack Detection: Anomaly Detection
14 Statistical anomaly detection with univariate and multivariate datap. 275
14.1 EWMA control chartsp. 275
14.2 Application of the EWMA control chart to cyber attack detectionp. 277
14.3 Chi-Square Distance Monitoring (CSDM) methodp. 284
14.4 Application of the CSDM method to cyber attack detectionp. 286
14.5 Summaryp. 288
Referencesp. 288
15 Stochastic anomaly detection using the Markov chain model of event transitionsp. 291
15.1 The Markov chain model of event transitions for cyber attack detectionp. 291
15.2 Detection performance of the Markov chain model-based anomaly detection technique and performance degradation with the increased mixture of attack and normal use datap. 293
15.3 Summaryp. 295
Referencesp. 296
Part VI Cyber Attack Detection: Attack Norm Separation
16 Mathematical and statistical models of attack data and normal use datap. 299
16.1 The training data for data modelingp. 299
16.2 Statistical data models for the mean featurep. 300
16.3 Statistical data models for the distribution featurep. 300
16.4 Time-series based statistical data models for the autocorrelation featurep. 301
16.5 The wavelet-based mathematical model for the wavelet featurep. 304
16.6 Summaryp. 309
Referencesp. 312
17 Cuscore-based attack norm separation modelsp. 313
17.1 The cuscorep. 313
17.2 Application of the cuscore models to cyber attack detectionp. 314
17.3 Detection performance of the cuscore detection modelsp. 316
17.4 Summaryp. 323
Referencesp. 325
Part VII Security Incident Assessment
18 Optimal selection and correlation of attack data characteristics in attack profilesp. 329
18.1 Integer programming to select an optimal set of attack data characteristicsp. 329
18.2 Attack profilingp. 330
18.3 Summaryp. 332
Referencesp. 332
Indexp. 333
Go to:Top of Page