SlideShare a Scribd company logo
1 of 15
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
DOI : 10.5121/ijcnc.2015.7407 99
Attack Countermeasure Tree (ACT) meets with
the Split-protocol
Bharat S Rawal
Department of Information Sciences and Technology, Penn State Abington, Abington,
PA 19001, USA.
ABSTRACT
In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) comprising
an additional attack resistant element known as the Split-protocol. ACT which circumvent the fabrication
and way out of a state-space representation and takes keen on account attack, as well as countermesures
(in the form of detection and mitigation events). Split-protocol as an attack resistant element enhances the
availability of the system during or after a security attack on the system. We compare ACT with or without
Split-protocol implantation. The split-protocol concept stemmed from splitting the HTTP/TCP protocol in
webserver application. An HTTP/TCP protocol is standard on a webserver can be split into two segments,
and each part can be separately run on a different Web server, thus constituting dual servers. These servers
communicate across a network by using inter-server messages or delegate messages.In ACT, recognition
and alleviation are allowed not just at the leaf node but also at the intermediate
nodes,andsimultaneouslythe state-space explosion problem is avoided in its analysis. We study the
consequences of incorporating countermeasures in the ACT and Split-protocol using various case studies.
KEYWORDS
attack trees, non-state-space model, mincuts, split-protocol, and reliability.
1.INTRODUCTION
The concept of attack trees is introduced from fault trees in software safety. Fault trees are used to
describe how errors disseminate in software systems, and analysis of this could be used to exam
software [10] and [11]. Although fault trees are most commonly used to model how problems
occur in critical systems, given the built in focus on error propagation, attack trees have a slightly
dissimilar perspective. The starter of an attacker, or group of attackers, makes it believable to
model extortion to an institute as well as the aspect of targeted attacks. Deliberations of
likelihoods based on existing money, tools or incentive for the attacker provides a more carefully
grounded duplicate of the risk level. Bruce Schneier offered the concept of attack trees as a way
to model threats against computer systems[12] The basic tree model describes the Attack Tree
with two different types of nodes, AND-nodes, and OR-nodes. At OR-nodes, a smallest of one
sub-goal should be fulfilled to achieve the goal of the node. At AND-nodes, every sub-goal
should be achieved to realize the objective of the node. The Boolean calculation could be done on
the values of sub goal nodes based on a Boolean expression (AND-/OR) in the node, giving the
following account in the node [9].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
100
To evaluate the safety of the system security, modeling is used.Regular step towards security
assessment is to plan and build a scalable model [12], [13] that helps to compute the security [14]
in terms of important characteristics such as the damage produced by an outbreak or the gain
achieved by implementing a certain set of countermeasures [15]. The simplest model issued in
this context is attack tree (AT) [1]. AT utilize the genetic algorithms to find optimal
countermeasure sets for the system from their AT models [6]. Though, the basic construct of AT
does not take into account defense mechanisms. Roy et al. developed a novel attack tree model
called attack countermeasure tree (ACT). The ACT is built on following deliberation, A) defense
mechanisms not restricted to not just at the leaf B) Mincuts are used to generate and analysis of
the attack and the attack countermeasure scenarios. C) Security analysis using various measures is
performed in an integrated manner [1].
The remainder of this paper is organized as follows. A brief related work is presented in section
II. In Section III, Split-protocol architecture presented. In Section IV, describe Split-protocol
configurations V. Describes attack countermeasure tree (ACT). VI. Present quantitative and
qualitative analysis. Some simulation results and the impact Split-protocol using ACT on
security analysis are discussed. Finally, we conclude the paper in Section VII.
2.RELATED WORK
A security risk is being modeled using a graphical, mathematical, decision tree structure called an
attack tree. There is cause to believe that attack trees are widely patronized by the intelligence
community. Fault trees were invented in the early 1960s for use in the Minuteman Missile System
[16]. Weiss described the threat logic trees [17]. Amoroso [18] detailed a modeling concept he
called threat trees. Then, Schneider [19] (noted security expert) promoted the idea though he
called it attack trees (AT). Moore et.al [20] prolonged Schneider’s AT by familiarizing attack
scenarios and attack profiles. Mauw et.al [21] developed an alternative formalism for AT where
the goal was associated with the set of all mincuts. When applied to complex case studies, AT
often became large and unwieldy. Therefore, Daley [22] proposed a layered approach to partition
attack tree nodes with respect to their functionality.
To the best of our knowledge, a technique for splitting an HTTP-based TCP connection in this
manner has not been proposed previously. Splitting is similar to mask failures in TCP [23] and to
use the M-TCP (Migratory TCP) protocol to migrate TCP connections from one server to another
[24]. However, connection migration in M-TCP does not involve splitting an HTTP request and
TCP connection or operating in split mode. Moreover, the client needs to initiate the migration
process in M-TCP, whereas TCP connection splitting is transparent to the client. TCP connection
splitting is also different from migrating Web applications in mobile computing [25], which
moves applications from one node to another on the Web by using virtualization techniques.
Likewise, connection splitting is different from process migration in [26], which requires that an
agent be dispatched from one system to run on another at a remote location.
3.SPLIT-PROTOCOL ARCHITECTURE
The basic split protocol architecture used for the experiments described in [2] is reproduced here
for illustration as shown in Figure 1. The http request is splited at the GET command between a
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
CS and a DS. The CS handles the connections, and the DS handles the data transfer.
connections, the CS also handles
knowledge of the requested file, its nam
the file itself. However, the DS has the file and serves the data to the client.
After the GET command is received by CS
delegate message DM1 to DS. The message DM1
that is stored in CS in the configuration
When DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it
initiated itselfin the DS. When a DS sends data to the
hadreceivedan FIN-ACK from the
server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the
request in DS. These DM1 and DM2 inter
at DS. More details of the design and imple
The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations
of given requests. A request received by
DS. That is, some requests can
variation of delegation ratio. As CS and DS are identical functional units, they can also perform
any given role of CS or a DS. During these
percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput.
The measurements indicated that the optimal split server performance was
(maximum can be 2.0). Thus, the two
server). These initial results provided us motivation to construct split protocol based servers as
described below. These novel splitting techniques and associated Web server architecture
introduced in this section also showed some p
server reliability.
Figure 1. Split
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
CS and a DS. The CS handles the connections, and the DS handles the data transfer.
handles the data ACKs and the connection closing. The CS has complete
knowledge of the requested file, its name, size, and other attributes, but it may or may not have
the file itself. However, the DS has the file and serves the data to the client.
the GET command is received by CS, it sends an ACK to the client and also sends a
delegate message DM1 to DS. The message DM1 contains the state infprmation
configuration of an entry in the TCP table (known as a TCB entry).
DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it
. When a DS sends data to the client, it uses the CS’s IP. After CS
from the client to signify connection closing, it sends another inter
server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the
request in DS. These DM1 and DM2 inter-server packets serve as the start and end of the
at DS. More details of the design and implementation can be found in [3].
The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations
A request received by CS can be either processed wholly at CS or delegated to
can be handled at CS and some can be transferred to DS resulting in a
variation of delegation ratio. As CS and DS are identical functional units, they can also perform
any given role of CS or a DS. During these experiments, we found that when the delegatio
percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput.
The measurements indicated that the optimal split server performance was 1.8035 for two servers
(maximum can be 2.0). Thus, the two-server system suffers only 20% capacity (10% for each
). These initial results provided us motivation to construct split protocol based servers as
described below. These novel splitting techniques and associated Web server architecture
introduced in this section also showed some potential in distributed computing and improving
Figure 1. Split-protocol Architecture [3]
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
101
CS and a DS. The CS handles the connections, and the DS handles the data transfer. Also to
the data ACKs and the connection closing. The CS has complete
e, size, and other attributes, but it may or may not have
and also sends a
infprmation of the request
as a TCB entry).
DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it was
it uses the CS’s IP. After CS
it sends another inter-
server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the
server packets serve as the start and end of the request
The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations
CS can be either processed wholly at CS or delegated to
to DS resulting in a
variation of delegation ratio. As CS and DS are identical functional units, they can also perform
we found that when the delegation
percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput.
1.8035 for two servers
capacity (10% for each
). These initial results provided us motivation to construct split protocol based servers as
described below. These novel splitting techniques and associated Web server architecture
otential in distributed computing and improving
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
5.SPLIT CONFIGURATIONS
Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with
partial or full delegation. In partial delegation mode, clients designated as non
request clients (NSRCs) send requests to the CS, and these requests are processed
completely by the CS as usual. The connections between the NSRCs and the CSs are
shown as dotted lines. With full
(SRCs) make requests to the CS, and these requests are delegated to DSs. For full
delegation, there are no NSRCs in the system. When requests are delegated to DSs, we
assume that they are equally dist
fashion. It is also possible to employ other distribution strategies
Figure 2. Split
Figure 3 shows a general configuration for connecting one DS, one or more
clients (Configuration 2.). It shows
configuration, we used small file sizes to avoid overloading the single DS[
Figure 3. Split
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
CONFIGURATIONS
Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with
In partial delegation mode, clients designated as non
request clients (NSRCs) send requests to the CS, and these requests are processed
completely by the CS as usual. The connections between the NSRCs and the CSs are
shown as dotted lines. With full delegation, clients designated as split-request clients
(SRCs) make requests to the CS, and these requests are delegated to DSs. For full
delegation, there are no NSRCs in the system. When requests are delegated to DSs, we
assume that they are equally distributed among DS1, DS2 and DS3 in round
fashion. It is also possible to employ other distribution strategies [4].
Figure 2. Split-protocol Architecture Configuration 1[4]
Figure 3 shows a general configuration for connecting one DS, one or more CSs and one or more
. It shows two CSs and one DS with both SRCs and NSRCs. For this
configuration, we used small file sizes to avoid overloading the single DS[4].
Figure 3. Split-protocol Architecture Configuration 2 [4]
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
102
Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with
In partial delegation mode, clients designated as non-split
request clients (NSRCs) send requests to the CS, and these requests are processed
completely by the CS as usual. The connections between the NSRCs and the CSs are
request clients
(SRCs) make requests to the CS, and these requests are delegated to DSs. For full
delegation, there are no NSRCs in the system. When requests are delegated to DSs, we
ributed among DS1, DS2 and DS3 in round-robin
CSs and one or more
and one DS with both SRCs and NSRCs. For this
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Figure 4 describes a general configuration for
or more clients (Configuration 3.). Various split configurations are useful according to the need of
system functionality. Example if we need a faster data transfer for
/Multi Server (MC/MS) configuration best ch
a connection with one connection server, and concurrent
data servers located on different subnets from each other. The data can be
clients anywhere on the network, which then reassemble or otherwise process the data. MC/MS
distributes the data of large file across multiple servers without any redundancy. The separation
of data transfer from a connection establishment is entirely transparent to the
Figure 4. Split
6.ATTACK COUNTERMEASURE
6.1Parameters
Ak is an attack event
Dk is a detection event
Mk isa mitigation event
CMk is a countermeasure
ACT = {V, ψ , E} (V: set of all
set of all gates in ACT, E: aset of all
where V= {∀k, vk: vk ∈ {Aj}|| vk
{Ml}} where A1, A2, D1, D2, M1, M2, are the
events of the ACT, = {∀k, k: k
gate}}, E= {∀k, ek: ek ∈ (vi, ψ
and X = (xA1xA2 ...xD1xD2 ...xM1x
vector for the ACT where xAk, x
variables associated with events A
Φ(X) structure function of an ACT
pAkodds of occurrence of attack event A
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
a general configuration for connecting multiple CSs, and various
or more clients (Configuration 3.). Various split configurations are useful according to the need of
system functionality. Example if we need a faster data transfer for alarge file, then Multi Client
/Multi Server (MC/MS) configuration best choice. In MC/MS architecture, one client establishes
a connection with one connection server, and concurrent data transfer dispatched from multiple
data servers located on different subnets from each other. The data can be sent to the multiple
ere on the network, which then reassemble or otherwise process the data. MC/MS
distributes the data of large file across multiple servers without any redundancy. The separation
of data transfer from a connection establishment is entirely transparent to the client.
Figure 4. Split-protocol Architecture Configuration 3[5]
OUNTERMEASURE TREE (ACT)
, E} (V: set of all vertices in ACT, :
set of all boundaries in ACT)
{Aj}|| vk ∈ {Di}|| vk ∈
{Ml}} where A1, A2, D1, D2, M1, M2, are the
k, k: k ∈ {AND, OR, k-of-n
(vi, ψ j ) || ek ∈ (ψ i , ψ j )}
xM2 ...) is a state
, xDk, xMk are the boolean
variables associated with events Ak, Dk,Mk respectively.
(X) structure function of an ACT
of occurrence of attack event Ak
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
103
various DSs and one
or more clients (Configuration 3.). Various split configurations are useful according to the need of
file, then Multi Client
oice. In MC/MS architecture, one client establishes
dispatched from multiple
to the multiple
ere on the network, which then reassemble or otherwise process the data. MC/MS
distributes the data of large file across multiple servers without any redundancy. The separation
client.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
pDkodds of success of detection event D
pMkodds of success of mitigation event M
Pgoal odds of attack success at the ACT goal
pUDodds of undetected attack at the ACT goal
pDUModds of detected but unmitigated attack at
the ACT goal
In this subsection, the basic formalism of ACT is reproduced.
classes of events: attack events (e.g., install a keystroke logger),
keystroke logger) and mitigation
ACT for a regular server system (non
Figure 5(a) shows simple ACT with a single
probability of success a successful attack at goal node
PGoal =PA
In figure 5(b), one attack event and one detection mechanism are applied. The corresponding
expression for the probability of an undetected attack at goal node is shown Eq.(1)..
PGoal = PA (1
For n, detection mechanisms are being used to detect one attack event equation becomes.
The corresponding PGoal is:
PGoal = PA (1-
In figure 5(c), one attack event, one detection mechanism
corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4).
PGoal = PA
Figure 5. ACT without Split
(
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
of success of detection event Dk
of success of mitigation event Mk
of attack success at the ACT goal
of undetected attack at the ACT goal
of detected but unmitigated attack at
In this subsection, the basic formalism of ACT is reproduced. In ACT, there are three
classes of events: attack events (e.g., install a keystroke logger), discovery events (e.g.,
keystroke logger) and mitigation activities (e.g., get rid of keystroke logger).
ACT for a regular server system (non-Split system)
Figure 5(a) shows simple ACT with a single-attack event. The corresponding expression for the
probability of success a successful attack at goal node is shown Eq. (1).
(1)
In figure 5(b), one attack event and one detection mechanism are applied. The corresponding
expression for the probability of an undetected attack at goal node is shown Eq.(1)..
(1- PD) (2)
For n, detection mechanisms are being used to detect one attack event equation becomes.
- PD1) (1- PD2) (1- PD3) …(1- PDn) (3)
figure 5(c), one attack event, one detection mechanism, and mitigation events are applied. The
corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4).
A (1- PD PM) (4)
Figure 5. ACT without Split-protocol [1]
(a) (b) (c)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
104
In ACT, there are three different
events (e.g., sense
attack event. The corresponding expression for the
In figure 5(b), one attack event and one detection mechanism are applied. The corresponding
expression for the probability of an undetected attack at goal node is shown Eq.(1)..
For n, detection mechanisms are being used to detect one attack event equation becomes.
and mitigation events are applied. The
corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4).
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Figure 5(a), representACT with one attack event
event and 5(c) represents ACT with one attack,one detection event and onemitigation event
ACT tree withoutSplit-protocol and t
successful attack at goal node is shown
PGoal = ½ PA
PGoal = ½ PA (1- PD)
PGoal = ½PA (1- PD PM)
Figure 6, represent the equivalent
protocolimplementationFigure 5(a), representACT with one attack event
5(b),ACT with two attacks , two
with two attacks, two detectionand two
Figure 6. Equivalent ACT
Figure 7. Equivalent
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
representACT with one attack event 5(b),ACT with one attack and one detection
ACT with one attack,one detection event and onemitigation event
protocol and the corresponding expression for the probability of success a
successful attack at goal node is shown are equation 5, 6 and 7.
)
) (7)
Figure 6, represent the equivalent ACT for figure 5(a) and 5(b) and
Figure 5(a), representACT with one attack event on CS and DS
s , two detections an two mitigation events. Figure 7, represents
and two mitigation eventsfor ACT tree with Split-protocol.
Equivalent ACT for figure 5(a) &5(b) with Split-protocol
Equivalent ACT for figure 5(c) with Split-protocol
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
105
ACT with one attack and one detection
ACT with one attack,one detection event and onemitigation event for
he corresponding expression for the probability of success a
(5)
(6)
(7)
and with Split-
on CS and DS
represents ACT
protocol.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Figure 8. shows one attack event, n detection
expression 8 displays the probability of a successful
attack was detected but not successfully mitigated.
PGoal = ܲ‫ܣ‬ሺ1 െ ሺ1 െ ∏ ሺ1 െ௠
௜ୀ଴
Figure 8. ACT without Split
Figure 8. shows aSplit system with one attack event, n detection
The corresponding expression 9
detected, or attack was detected but not successfully mitigated.
PGoal= (1/2) {ܲ‫ܣ‬ሺ1 െ ሺ1 െ ∏ ሺ1௠
௜ୀ଴
Figure 9.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
one attack event, n detection events, and n mitigation events. The corresponding
the probability of a successful attack, either attack was not
attack was detected but not successfully mitigated.
ሺ െ ܲ‫݅ܦ‬ሻሻሻ ൈ ሺ1 െ ∏ ሺ1 െ ܲ‫݅ܯ‬ሻሻሻ௡
௜ୀ଴
Figure 8. ACT without Split-protocol for multiple detection and mitigation events [
system with one attack event, n detection events, and n mitigation
The corresponding expression 9 shows the probability of a successful attack; either attack
or attack was detected but not successfully mitigated.
ሺ1 െ ܲ‫݅ܦ‬ሻሻሻ ൈ ሺ1 െ ∏ ሺ1 െ ܲ‫݅ܯ‬ሻሻሻ௡
௜ୀ଴ } 9
Figure 9. Equivalent ACT for figure 8 with Split-protocol
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
106
and n mitigation events. The corresponding
attack was not detected or
(8)
events [1].
mitigation events.
either attack was not
} 9
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Figure 10. shows one attack event, n pairs of detection event and mitigation event. The
corresponding expression is displayed
Figure 10. ACT without Split
Figure 11. shows ACT structure with
event and mitigation event. The corresponding expression 11
successful attack.
PGoal = ½ܲ‫ܣ‬ ∏ ሺ1 െ ܲ‫݅ܦ‬ ൈ ܲ‫݅ܯ‬௡
௜ୀ଴
Figure 11. ACT with Split
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Figure 10. shows one attack event, n pairs of detection event and mitigation event. The
displayed by the equetion 10 for the probability of successful attack.
PGoalܲ‫ܣ‬ ∏ ሺ1 െ ܲ‫݅ܦ‬ ൈ ܲ‫݅ܯ‬ሻ௡
௜ୀ଴ 10
Figure 10. ACT without Split-protocol formultiple pairs of detection and mitigation events [
Figure 11. shows ACT structure with asplit system with one attack event, n pairs of detection
event. The corresponding expression 11 displays the probability of
ܲ‫݅ܯ‬ሻ11
Figure 11. ACT with Split-protocol for multiple pairs of detection and mitigation events.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
107
Figure 10. shows one attack event, n pairs of detection event and mitigation event. The
the probability of successful attack.
events [1].
, n pairs of detection
the probability of
pairs of detection and mitigation events.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
7.QUALITATIVE AND
7.1 Probabilistic Analysis
Table I.
Gate Type
AND gate
OR gate
k/n gate*
*for identical inputs [1]
Figure 12, illustartes adirect attack tree for resetting the BGP session
top eventis connected with the set of all mincuts.Mincuts ofAT represent attack scenarios [
whereas those of an ACT, represent attack
Figure 12. A straightforward
Top= {{[(A1121+A1122+A1123) + (A
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
AND QUANTITATIVE ANALYSIS WITH
Table I. methods for probability of attack success
Gate Type Prob. of attack success
AND gate
ෑ ‫݌‬ሺ݅ሻ
௡
௜ୀଵ
1 െ ෑሺ1 െ ‫݌‬ሺ݅ሻሻ
௡
௜ୀଵ
෎ ൬
݊
݆
൰ ‫݌‬௝
∗ ሺ1 െ ‫݌‬ሻ௡ି௝
௡
௃ୀ௞
*for identical inputs [1]
attack tree for resetting the BGP session. In both AT and ACT, the
with the set of all mincuts.Mincuts ofAT represent attack scenarios [
whereas those of an ACT, represent attack-countermeasure scenarios
straightforward attack tree for resetting the BGP session [1]
(A111)]}. [(D12).M12). (A12)].(D1.M1)} + {(D2.M2).A2)}}
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
108
WITH ACT
In both AT and ACT, the
with the set of all mincuts.Mincuts ofAT represent attack scenarios [1, 26]
)}}
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
Some of the Boolean algebra laws are
i. Commutative Law
(a) A + B = B + A
(b) A B = B A
ii. Associative Law
(a) (A + B) + C = A + (B + C)
(b) (A B) C = A (B C)
iii. Distributive Law
(a) A (B + C) = A B + A C
(b) A + (B C) = (A + B) (A + C)
iv. Identity Law
(a) A + A = A
(b) A A = A
v.Redundancy Law
(a) A + A B = A
(b) A (A + B) = A
Figure 13. An attack
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,
laws are.
(b) A + (B C) = (A + B) (A + C)
attacktree with Split-protocol for resetting the BGP session
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
109
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
110
TOP = {{[(A1121+A1122+A1123)+(A111)]}.{[(D12).M12).(A12)].(D1.M1)}+{(D2.M2).A2)}}
*{{[(A1121+A1122+A1123)+(A111)]}.[(D12).M12).(A12)].(D1.M1)} +{(D2. M2).A2)}}
vi. Applying the Identity Law
A.A = A
= {{[(A1121+A1122+A1123) + (A111)]}. [(D12).M12). (A12)].(D1.M1)} + {(D2.M2).A2)}}
Split Protocol: Failure Rate and Survival Function
The distribution of each protocol component is the binomial distribution. With the number
protocol of component n approach infinity, distribution of each component is poison distribution
[4] with arrival rate, λ that is equal to the receiving rate of each component. Thus, service time or
failure rate (FR) of each element is an exponential distribution [3].
1. All the n components service time X is exponentially distributed:
F (T) = P {X≤T} = 1- e-λT; f (T) = λe-λT
2. Each ith
component1 ≤ i ≤ n, Failure Rate (FR) is constant.(,λi(t)= λi)
3. All n components are identical. Then FR of each element is equal to λ (λi = λ; 1 ≤ i ≤ n)
4. All n components are independent. Then
5. P {X1, X2...Xn> T} = P{X1>T} P{X2>T}…P{Xn>T}
6. The reliability of each component, Ri(T) is
a. Ri (T) = P {Xi> T} = e-λT
b. λ = -ln (Ri (T))/T
c. T denoted system mission time.
7. System failure rate is 1 – R (T) where R (T) indicated the reliability of the whole system.
There are supposed "n” protocol components and probability of non-failure (of each
component(x1, x2, x3, x4...) are exponentially distributed: For simplicity we will assume, every
i^th component 1 ≤ i ≤ n probability of failure is equal to all component, i.e. Failure Rate (FR) for
each component is same and (θi (τ) = θi). For given operational time and all system, components
are identical and their failure time is independent. Therefore, the reliability of, any ithcomponent
(1 <i< n) reliability "Π i(τ)": "Π i(τ)" = P(Xi> τ) = ݁஘୧த
=>θi =-ln(Π i(τ))/ τ .
First, we have assumed identical components, which are identical DS in a cluster System, and
they have same FR. Also, they are independent components those whose failure does not affect
the performance of any other system component [2].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
111
Reliability of Parallel identical components:
Π S =1-(1 - Π 1) × (1 - Π 2) ×... (1 - Π n); if the component reliabilities differ
Π S =1-(1 - Π) × (1 - Π) ×... (1 - Π); if the component with similar reliability
1-[1 - Π ]n
For example system of two parallel components (CS, DS)
Π τ =1-{(1-Π 1(τ)) (1-Π 2(τ))}
= 1- {(1- ݁ିθଵτ
)	(	1 − ݁ିθଶτ
)}
= ݁ିθଵτ
+݁ିθଶτ
- ݁ି(θଵାθଶሻτ
And MTTF = µ =‫׬‬ ߨ	(ܶ
∝
଴
ሻ݀τ= ‫׬‬ (݁ିθଵτ
+ ݁ିθଶτ
− ݁ି(θଵାθଶሻτ∝
଴	
ሻ݀τ
=
ଵ
θଵ
+
ଵ
θଶ
-
ଵ
θଵାθଶ
And FR = θs = Density Function / Survival Function
= -
ௗ
ௗ௧
ߨ	(τሻ / Π (τ)
=(θ1݁ିθଵτ
+ θ2݁ିθଶτ
– (	θ1 + θ2ሻ݁ି(θଵାθଶሻτ
	/(݁ିθଵτ
+ ݁ିθଶτ
− ݁ି(θଵାθଶሻτ
)(22)
This system hazard rate θs(τ) can be calculated as a function of any mission time τ [3].
7.2 Mincut Analysis
According to Roy, et al, the mincuts (attack alleviationscenarios) of the ACT in Figure10 are
{(A111, CM1, A12, CM12), (A1121, CM1, A12, CM12), (A1122, CM1, A12, CM12), (A1123, CM1, A12,
CM12), (A2, CM2)} (where CM1= (D1M1), CM12= (D12M12), M2= (D2M2))[1]. Each of the 5
mincuts corresponds to a permutation of actionseach of happening will result in attack hit at the
target. For example, the mincut (A1122, CM1, A12, CM12) indicates that iftogether the attack events
A1122 and A12 were to take place and if both the defense activity CM1 and CM12 fail, attack will
be successful. From the mincut (A1122, CM1, A12, CM12) we also observe that the pair of attack
events (A1122, A12) is covered by either of the countermeasures CM1 or CM12 [1].
7.3 Qualitative Analysis:
Minimal cut set (mincut): a minimum combination of primary events that induce the top event
Introducing Split-protocol increase length of mincut, which signals low vulnerability. The split
does not introduce additional new cut sets. This implies that the inclusion of split system does not
introduce additional vulnerability in the overall system. Split- protocol reduces thechance of a
single point of failure. Spilt –protocol introduces n parallel components, to fail system all n
component must be faulty. The splitprotocol offers inbuilt architecture reliability and fault
tolerance against DoS/DDoS attack [8].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
112
8.CONCLUSION
In this paper,we have presented the attack countermeasure trees (ACT) with implementing, a non-
state-space representation that permits us to perform qualitative and probabilistic analysis of the
security of the system. ACT takes into account attacks as well as countermeasures (in the form of
detection mechanisms and mitigation techniques). The detection and mitigation can be placed not
just at the leaf node but also at any intermediate node. When we implement the Split-protocol in
thesystem, it reduces the probability of system failure by 50%. If thesystemis made of n split unit,
system reliability will improve by n times. The innovative splitting system and associated Web
server architecture introduced in this paper have potential applications in distributed computing
and improving server reliability.
REFRENCES
[1] Roy, Arpan, Dong Seong Kim, and Kishor S. Trivedi. "Attack countermeasure trees (ACT): towards
unifying the constructs of attack and defense trees. “Security and Communication Networks 5.8
(2012): 929-943.
[2] Roy, Arpan, Dong Seong Kim, and Kishor S. Trivedi. "Scalable optimal countermeasure selection
using implicit enumeration on attack countermeasure trees." Dependable Systems and Networks
(DSN), 2012 42nd Annual IEEE/IFIP International Conference on. IEEE, 2012.
[3] B.Rawal, R. Karne, and A. L. Wijesinha. “Splitting HTTP Requests on Two Servers.” The Third
International Conference on Communication Systems and Networks: COMPSNETS 2011, January
2011, Bangalor, India.
[4] B. Rawal, R. Karne, and A. L. Wijesinha. “Mini Web Server Clusters based on HTTP Request
Splitting” HPCC 2011 : The 13th IEEE International Conference on High Performance Computing
and Communications ,Sep 2, 2011- Sep 4, 2011, Banff, Canada.
[5] Rawal, Bharat, et al. "Split-Encoding: The Next Frontier Tool for Big Data."Advanced Computing,
Networking and Informatics-Volume 1. Springer International Publishing, 2014. 501-510.
[6] START Understanding Series and Parallel Systems Reliability, Selected Topics in Assurance Related
Technologies, volume 11, Number 5 (34)
[7] Sheldon M. Ross, A First Course In Probability, Eighth Edition
[8] Resistant Augmented Split Architecture,” IEEE 10th HONET- CNS , EMU, Famagusta, Cyprus
2013.
[9] Espedalen, Jeanne H. "Attack trees describing security in distributed internet-enabled metrology."
(2007).
[10] Leveson, N. G. 1995. Safeware: System Safety and Computers. Addison-Wesley,Reading MA.
[11] Viega, J. & McGraw, G. 2002. Building Secure Software: How to Avoid Security Problems the
Right Way. Addison-Wesley.
[12] Ortalo R, Deswarte Y, Kaˆaniche M. Experimenting with quantitative evaluation tools for
monitoring operational security. IEEE Trans. on Software Engineering 1999; 25(5):633–
650.
[13] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New
York, NY, USA, 2000.
[14] Trivedi KS, Kim DS, Roy A,Medhi D. Dependability and security models. Proc. DRCN, IEEE,
2009; 11– 20.
[15] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New
York, NY, USA, 2000.
[16] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New
York, NY, USA, 2000.
[17] J.D. Weiss, A System Security Engineering Process, Proceedings of the 14th National Computer
Security Conference, 1991
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
113
[18] Edward G. Amoroso, Fundamentals of Computer Security Technology, pp 15-29, Prentice-Hall,
1994, ISBN01310892935
[19] B. Schneier, Attack Trees, Dr. Dobb's Journal, v. 24, n. 12, December
[20] Moore AP, Ellison RJ, Linger RC. Attack Modelingfor Information Security and
Survivability.CMU/SEI-2001-TN-001 2001.
[21] Mauw S, Oostdijk M. Foundations of Attack Trees.LNCS2006; 3935:186–198
[22] Daley K, Larson R, Dawkins J. A StructuralFramework for Modeling Multi-stage Network Attacks.
Proc. ICPPW, 2002; 1530–1536.
[23] D. Zagorodnov, K. Marzullo, L. Alvisi and T.C. Bressourd, “Practical and low overhead masking of
failures of TCP-based servers,” ACM Transactions on Computer Systems, Volume 27, Issue 2,
Article 4, May 2009.
[24] K. Sultan, D. Srinivasan, D. Iyer and L. lftod. “Migratory TCP: Highly Available Internet Services
using Connection Migration,” Proceedings of the 22nd International Conference on Distributed
Computing Systems, July 2002.
[25] G. Canfora, G. Di Santo, G. Venturi, E. Zimeo and M.V.Zito, “Migrating web application sessions in
mobile computing,” Proceedings of the 14th International Conference on the World Wide Web, 2005,
pp. 1166-1167.
[26] T. Venton, M. Miller, R. Kalla, and A. Blanchard, “A Linux-based tool for hardware bring up, Linux
development, and manufacturing,” IBM Systems J., Vol. 44 (2), IBM, NY, 2005, pp. 319-330.Gan Z,
Tang J, Wu P, Varadharajan V. A NovelSecurity Risk Evaluation for Information Systems.Proc.
FCST, 2007; 67–73.
Author
Dr. Bharat Rawal, has conducted research in the area of computer networks, including
wireless networks, Split- protocol designs and analyzes, and network performance
evaluations, HPC and Network security. He was the author and co-author in several papers in
networking and security area. Currently, he has focused on solving a big integers and data
compression in Split-protocol infrastructure. He is now server as Assistant Professor in IST
department at Penn State Abington and Visiting Assistant Professor in the department of
Electrical and Computer Engineering at Duke University.

More Related Content

What's hot

Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Gulshan Shrivastava
 
Distributed Computing: An Overview
Distributed Computing: An OverviewDistributed Computing: An Overview
Distributed Computing: An OverviewEswar Publications
 
Updatable Queue Protocol Based On TCP For Virtual Reality Environment
Updatable Queue Protocol Based On TCP For Virtual Reality Environment Updatable Queue Protocol Based On TCP For Virtual Reality Environment
Updatable Queue Protocol Based On TCP For Virtual Reality Environment IJCSEA Journal
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONREDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONcsandit
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsIOSR Journals
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofIAEME Publication
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
A Critique of the CAP Theorem by Martin Kleppmann
A Critique of the CAP Theorem by Martin KleppmannA Critique of the CAP Theorem by Martin Kleppmann
A Critique of the CAP Theorem by Martin Kleppmannmustafa sarac
 

What's hot (20)

Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122
 
Distributed Computing: An Overview
Distributed Computing: An OverviewDistributed Computing: An Overview
Distributed Computing: An Overview
 
Updatable Queue Protocol Based On TCP For Virtual Reality Environment
Updatable Queue Protocol Based On TCP For Virtual Reality Environment Updatable Queue Protocol Based On TCP For Virtual Reality Environment
Updatable Queue Protocol Based On TCP For Virtual Reality Environment
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONREDUCING FREQUENCY OF GROUP REKEYING OPERATION
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
 
Securing Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed SystemsSecuring Group Communication in Partially Distributed Systems
Securing Group Communication in Partially Distributed Systems
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability of
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 
Lm2519942003
Lm2519942003Lm2519942003
Lm2519942003
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
A Critique of the CAP Theorem by Martin Kleppmann
A Critique of the CAP Theorem by Martin KleppmannA Critique of the CAP Theorem by Martin Kleppmann
A Critique of the CAP Theorem by Martin Kleppmann
 

Viewers also liked

Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemIJCNCJournal
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security onIJCNCJournal
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wirelessIJCNCJournal
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsIJCNCJournal
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of theIJCNCJournal
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamicIJCNCJournal
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoringIJCNCJournal
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server forIJCNCJournal
 

Viewers also liked (19)

Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor system
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security on
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wireless
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumns
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamic
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoring
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server for
 

Similar to Attack countermeasure tree (act) meets with

Augmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderAugmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderijcsa
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudIRJET Journal
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLhiij
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLijccsa
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocolneirew J
 
Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...journalBEEI
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEIJNSA Journal
 
A Review Of Network Security Metrics
A Review Of Network Security MetricsA Review Of Network Security Metrics
A Review Of Network Security MetricsLisa Riley
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...neirew J
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTijccsa
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019ijsrd.com
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...IJECEIAES
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecturechristophefeltus
 
Q-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionQ-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionIJECEIAES
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...IJECEIAES
 

Similar to Attack countermeasure tree (act) meets with (20)

Augmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defenderAugmented split –protocol; an ultimate d do s defender
Augmented split –protocol; an ultimate d do s defender
 
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOLIMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
IMPROVED SECURE CLOUD TRANSMISSION PROTOCOL
 
Improved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission ProtocolImproved Secure Cloud Transmission Protocol
Improved Secure Cloud Transmission Protocol
 
Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...Optimal software-defined network topology for distributed denial of service a...
Optimal software-defined network topology for distributed denial of service a...
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
 
A Review Of Network Security Metrics
A Review Of Network Security MetricsA Review Of Network Security Metrics
A Review Of Network Security Metrics
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Q-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionQ-learning based distributed denial of service detection
Q-learning based distributed denial of service detection
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 

Attack countermeasure tree (act) meets with

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 DOI : 10.5121/ijcnc.2015.7407 99 Attack Countermeasure Tree (ACT) meets with the Split-protocol Bharat S Rawal Department of Information Sciences and Technology, Penn State Abington, Abington, PA 19001, USA. ABSTRACT In this paper, we present a novel attack tree paradigm called attack countermeasure tree (ACT) comprising an additional attack resistant element known as the Split-protocol. ACT which circumvent the fabrication and way out of a state-space representation and takes keen on account attack, as well as countermesures (in the form of detection and mitigation events). Split-protocol as an attack resistant element enhances the availability of the system during or after a security attack on the system. We compare ACT with or without Split-protocol implantation. The split-protocol concept stemmed from splitting the HTTP/TCP protocol in webserver application. An HTTP/TCP protocol is standard on a webserver can be split into two segments, and each part can be separately run on a different Web server, thus constituting dual servers. These servers communicate across a network by using inter-server messages or delegate messages.In ACT, recognition and alleviation are allowed not just at the leaf node but also at the intermediate nodes,andsimultaneouslythe state-space explosion problem is avoided in its analysis. We study the consequences of incorporating countermeasures in the ACT and Split-protocol using various case studies. KEYWORDS attack trees, non-state-space model, mincuts, split-protocol, and reliability. 1.INTRODUCTION The concept of attack trees is introduced from fault trees in software safety. Fault trees are used to describe how errors disseminate in software systems, and analysis of this could be used to exam software [10] and [11]. Although fault trees are most commonly used to model how problems occur in critical systems, given the built in focus on error propagation, attack trees have a slightly dissimilar perspective. The starter of an attacker, or group of attackers, makes it believable to model extortion to an institute as well as the aspect of targeted attacks. Deliberations of likelihoods based on existing money, tools or incentive for the attacker provides a more carefully grounded duplicate of the risk level. Bruce Schneier offered the concept of attack trees as a way to model threats against computer systems[12] The basic tree model describes the Attack Tree with two different types of nodes, AND-nodes, and OR-nodes. At OR-nodes, a smallest of one sub-goal should be fulfilled to achieve the goal of the node. At AND-nodes, every sub-goal should be achieved to realize the objective of the node. The Boolean calculation could be done on the values of sub goal nodes based on a Boolean expression (AND-/OR) in the node, giving the following account in the node [9].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 100 To evaluate the safety of the system security, modeling is used.Regular step towards security assessment is to plan and build a scalable model [12], [13] that helps to compute the security [14] in terms of important characteristics such as the damage produced by an outbreak or the gain achieved by implementing a certain set of countermeasures [15]. The simplest model issued in this context is attack tree (AT) [1]. AT utilize the genetic algorithms to find optimal countermeasure sets for the system from their AT models [6]. Though, the basic construct of AT does not take into account defense mechanisms. Roy et al. developed a novel attack tree model called attack countermeasure tree (ACT). The ACT is built on following deliberation, A) defense mechanisms not restricted to not just at the leaf B) Mincuts are used to generate and analysis of the attack and the attack countermeasure scenarios. C) Security analysis using various measures is performed in an integrated manner [1]. The remainder of this paper is organized as follows. A brief related work is presented in section II. In Section III, Split-protocol architecture presented. In Section IV, describe Split-protocol configurations V. Describes attack countermeasure tree (ACT). VI. Present quantitative and qualitative analysis. Some simulation results and the impact Split-protocol using ACT on security analysis are discussed. Finally, we conclude the paper in Section VII. 2.RELATED WORK A security risk is being modeled using a graphical, mathematical, decision tree structure called an attack tree. There is cause to believe that attack trees are widely patronized by the intelligence community. Fault trees were invented in the early 1960s for use in the Minuteman Missile System [16]. Weiss described the threat logic trees [17]. Amoroso [18] detailed a modeling concept he called threat trees. Then, Schneider [19] (noted security expert) promoted the idea though he called it attack trees (AT). Moore et.al [20] prolonged Schneider’s AT by familiarizing attack scenarios and attack profiles. Mauw et.al [21] developed an alternative formalism for AT where the goal was associated with the set of all mincuts. When applied to complex case studies, AT often became large and unwieldy. Therefore, Daley [22] proposed a layered approach to partition attack tree nodes with respect to their functionality. To the best of our knowledge, a technique for splitting an HTTP-based TCP connection in this manner has not been proposed previously. Splitting is similar to mask failures in TCP [23] and to use the M-TCP (Migratory TCP) protocol to migrate TCP connections from one server to another [24]. However, connection migration in M-TCP does not involve splitting an HTTP request and TCP connection or operating in split mode. Moreover, the client needs to initiate the migration process in M-TCP, whereas TCP connection splitting is transparent to the client. TCP connection splitting is also different from migrating Web applications in mobile computing [25], which moves applications from one node to another on the Web by using virtualization techniques. Likewise, connection splitting is different from process migration in [26], which requires that an agent be dispatched from one system to run on another at a remote location. 3.SPLIT-PROTOCOL ARCHITECTURE The basic split protocol architecture used for the experiments described in [2] is reproduced here for illustration as shown in Figure 1. The http request is splited at the GET command between a
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, CS and a DS. The CS handles the connections, and the DS handles the data transfer. connections, the CS also handles knowledge of the requested file, its nam the file itself. However, the DS has the file and serves the data to the client. After the GET command is received by CS delegate message DM1 to DS. The message DM1 that is stored in CS in the configuration When DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it initiated itselfin the DS. When a DS sends data to the hadreceivedan FIN-ACK from the server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the request in DS. These DM1 and DM2 inter at DS. More details of the design and imple The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations of given requests. A request received by DS. That is, some requests can variation of delegation ratio. As CS and DS are identical functional units, they can also perform any given role of CS or a DS. During these percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput. The measurements indicated that the optimal split server performance was (maximum can be 2.0). Thus, the two server). These initial results provided us motivation to construct split protocol based servers as described below. These novel splitting techniques and associated Web server architecture introduced in this section also showed some p server reliability. Figure 1. Split International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, CS and a DS. The CS handles the connections, and the DS handles the data transfer. handles the data ACKs and the connection closing. The CS has complete knowledge of the requested file, its name, size, and other attributes, but it may or may not have the file itself. However, the DS has the file and serves the data to the client. the GET command is received by CS, it sends an ACK to the client and also sends a delegate message DM1 to DS. The message DM1 contains the state infprmation configuration of an entry in the TCP table (known as a TCB entry). DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it . When a DS sends data to the client, it uses the CS’s IP. After CS from the client to signify connection closing, it sends another inter server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the request in DS. These DM1 and DM2 inter-server packets serve as the start and end of the at DS. More details of the design and implementation can be found in [3]. The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations A request received by CS can be either processed wholly at CS or delegated to can be handled at CS and some can be transferred to DS resulting in a variation of delegation ratio. As CS and DS are identical functional units, they can also perform any given role of CS or a DS. During these experiments, we found that when the delegatio percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput. The measurements indicated that the optimal split server performance was 1.8035 for two servers (maximum can be 2.0). Thus, the two-server system suffers only 20% capacity (10% for each ). These initial results provided us motivation to construct split protocol based servers as described below. These novel splitting techniques and associated Web server architecture introduced in this section also showed some potential in distributed computing and improving Figure 1. Split-protocol Architecture [3] International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 101 CS and a DS. The CS handles the connections, and the DS handles the data transfer. Also to the data ACKs and the connection closing. The CS has complete e, size, and other attributes, but it may or may not have and also sends a infprmation of the request as a TCB entry). DM1 reaches the DS, it creates its TCB entry and starts processing this request as if it was it uses the CS’s IP. After CS it sends another inter- server packet referred to as DM2 to DS. The DM2 received by DS will close the state of the server packets serve as the start and end of the request The CS and DS architecture illustrated in Figure 1 provides a variety of delegation configurations CS can be either processed wholly at CS or delegated to to DS resulting in a variation of delegation ratio. As CS and DS are identical functional units, they can also perform we found that when the delegation percentage is 25% in both directions (CS and DS) [4], we achieved the maximum throughput. 1.8035 for two servers capacity (10% for each ). These initial results provided us motivation to construct split protocol based servers as described below. These novel splitting techniques and associated Web server architecture otential in distributed computing and improving
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, 5.SPLIT CONFIGURATIONS Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with partial or full delegation. In partial delegation mode, clients designated as non request clients (NSRCs) send requests to the CS, and these requests are processed completely by the CS as usual. The connections between the NSRCs and the CSs are shown as dotted lines. With full (SRCs) make requests to the CS, and these requests are delegated to DSs. For full delegation, there are no NSRCs in the system. When requests are delegated to DSs, we assume that they are equally dist fashion. It is also possible to employ other distribution strategies Figure 2. Split Figure 3 shows a general configuration for connecting one DS, one or more clients (Configuration 2.). It shows configuration, we used small file sizes to avoid overloading the single DS[ Figure 3. Split International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, CONFIGURATIONS Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with In partial delegation mode, clients designated as non request clients (NSRCs) send requests to the CS, and these requests are processed completely by the CS as usual. The connections between the NSRCs and the CSs are shown as dotted lines. With full delegation, clients designated as split-request clients (SRCs) make requests to the CS, and these requests are delegated to DSs. For full delegation, there are no NSRCs in the system. When requests are delegated to DSs, we assume that they are equally distributed among DS1, DS2 and DS3 in round fashion. It is also possible to employ other distribution strategies [4]. Figure 2. Split-protocol Architecture Configuration 1[4] Figure 3 shows a general configuration for connecting one DS, one or more CSs and one or more . It shows two CSs and one DS with both SRCs and NSRCs. For this configuration, we used small file sizes to avoid overloading the single DS[4]. Figure 3. Split-protocol Architecture Configuration 2 [4] International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 102 Configuration 2 in Fig. 2 shows a single CS with two or more DSs in the system with In partial delegation mode, clients designated as non-split request clients (NSRCs) send requests to the CS, and these requests are processed completely by the CS as usual. The connections between the NSRCs and the CSs are request clients (SRCs) make requests to the CS, and these requests are delegated to DSs. For full delegation, there are no NSRCs in the system. When requests are delegated to DSs, we ributed among DS1, DS2 and DS3 in round-robin CSs and one or more and one DS with both SRCs and NSRCs. For this
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Figure 4 describes a general configuration for or more clients (Configuration 3.). Various split configurations are useful according to the need of system functionality. Example if we need a faster data transfer for /Multi Server (MC/MS) configuration best ch a connection with one connection server, and concurrent data servers located on different subnets from each other. The data can be clients anywhere on the network, which then reassemble or otherwise process the data. MC/MS distributes the data of large file across multiple servers without any redundancy. The separation of data transfer from a connection establishment is entirely transparent to the Figure 4. Split 6.ATTACK COUNTERMEASURE 6.1Parameters Ak is an attack event Dk is a detection event Mk isa mitigation event CMk is a countermeasure ACT = {V, ψ , E} (V: set of all set of all gates in ACT, E: aset of all where V= {∀k, vk: vk ∈ {Aj}|| vk {Ml}} where A1, A2, D1, D2, M1, M2, are the events of the ACT, = {∀k, k: k gate}}, E= {∀k, ek: ek ∈ (vi, ψ and X = (xA1xA2 ...xD1xD2 ...xM1x vector for the ACT where xAk, x variables associated with events A Φ(X) structure function of an ACT pAkodds of occurrence of attack event A International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, a general configuration for connecting multiple CSs, and various or more clients (Configuration 3.). Various split configurations are useful according to the need of system functionality. Example if we need a faster data transfer for alarge file, then Multi Client /Multi Server (MC/MS) configuration best choice. In MC/MS architecture, one client establishes a connection with one connection server, and concurrent data transfer dispatched from multiple data servers located on different subnets from each other. The data can be sent to the multiple ere on the network, which then reassemble or otherwise process the data. MC/MS distributes the data of large file across multiple servers without any redundancy. The separation of data transfer from a connection establishment is entirely transparent to the client. Figure 4. Split-protocol Architecture Configuration 3[5] OUNTERMEASURE TREE (ACT) , E} (V: set of all vertices in ACT, : set of all boundaries in ACT) {Aj}|| vk ∈ {Di}|| vk ∈ {Ml}} where A1, A2, D1, D2, M1, M2, are the k, k: k ∈ {AND, OR, k-of-n (vi, ψ j ) || ek ∈ (ψ i , ψ j )} xM2 ...) is a state , xDk, xMk are the boolean variables associated with events Ak, Dk,Mk respectively. (X) structure function of an ACT of occurrence of attack event Ak International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 103 various DSs and one or more clients (Configuration 3.). Various split configurations are useful according to the need of file, then Multi Client oice. In MC/MS architecture, one client establishes dispatched from multiple to the multiple ere on the network, which then reassemble or otherwise process the data. MC/MS distributes the data of large file across multiple servers without any redundancy. The separation client.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, pDkodds of success of detection event D pMkodds of success of mitigation event M Pgoal odds of attack success at the ACT goal pUDodds of undetected attack at the ACT goal pDUModds of detected but unmitigated attack at the ACT goal In this subsection, the basic formalism of ACT is reproduced. classes of events: attack events (e.g., install a keystroke logger), keystroke logger) and mitigation ACT for a regular server system (non Figure 5(a) shows simple ACT with a single probability of success a successful attack at goal node PGoal =PA In figure 5(b), one attack event and one detection mechanism are applied. The corresponding expression for the probability of an undetected attack at goal node is shown Eq.(1).. PGoal = PA (1 For n, detection mechanisms are being used to detect one attack event equation becomes. The corresponding PGoal is: PGoal = PA (1- In figure 5(c), one attack event, one detection mechanism corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4). PGoal = PA Figure 5. ACT without Split ( International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, of success of detection event Dk of success of mitigation event Mk of attack success at the ACT goal of undetected attack at the ACT goal of detected but unmitigated attack at In this subsection, the basic formalism of ACT is reproduced. In ACT, there are three classes of events: attack events (e.g., install a keystroke logger), discovery events (e.g., keystroke logger) and mitigation activities (e.g., get rid of keystroke logger). ACT for a regular server system (non-Split system) Figure 5(a) shows simple ACT with a single-attack event. The corresponding expression for the probability of success a successful attack at goal node is shown Eq. (1). (1) In figure 5(b), one attack event and one detection mechanism are applied. The corresponding expression for the probability of an undetected attack at goal node is shown Eq.(1).. (1- PD) (2) For n, detection mechanisms are being used to detect one attack event equation becomes. - PD1) (1- PD2) (1- PD3) …(1- PDn) (3) figure 5(c), one attack event, one detection mechanism, and mitigation events are applied. The corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4). A (1- PD PM) (4) Figure 5. ACT without Split-protocol [1] (a) (b) (c) International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 104 In ACT, there are three different events (e.g., sense attack event. The corresponding expression for the In figure 5(b), one attack event and one detection mechanism are applied. The corresponding expression for the probability of an undetected attack at goal node is shown Eq.(1).. For n, detection mechanisms are being used to detect one attack event equation becomes. and mitigation events are applied. The corresponding expression for the probability of an undetected attack at goal node is shown Eq.(4).
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Figure 5(a), representACT with one attack event event and 5(c) represents ACT with one attack,one detection event and onemitigation event ACT tree withoutSplit-protocol and t successful attack at goal node is shown PGoal = ½ PA PGoal = ½ PA (1- PD) PGoal = ½PA (1- PD PM) Figure 6, represent the equivalent protocolimplementationFigure 5(a), representACT with one attack event 5(b),ACT with two attacks , two with two attacks, two detectionand two Figure 6. Equivalent ACT Figure 7. Equivalent International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, representACT with one attack event 5(b),ACT with one attack and one detection ACT with one attack,one detection event and onemitigation event protocol and the corresponding expression for the probability of success a successful attack at goal node is shown are equation 5, 6 and 7. ) ) (7) Figure 6, represent the equivalent ACT for figure 5(a) and 5(b) and Figure 5(a), representACT with one attack event on CS and DS s , two detections an two mitigation events. Figure 7, represents and two mitigation eventsfor ACT tree with Split-protocol. Equivalent ACT for figure 5(a) &5(b) with Split-protocol Equivalent ACT for figure 5(c) with Split-protocol International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 105 ACT with one attack and one detection ACT with one attack,one detection event and onemitigation event for he corresponding expression for the probability of success a (5) (6) (7) and with Split- on CS and DS represents ACT protocol.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Figure 8. shows one attack event, n detection expression 8 displays the probability of a successful attack was detected but not successfully mitigated. PGoal = ܲ‫ܣ‬ሺ1 െ ሺ1 െ ∏ ሺ1 െ௠ ௜ୀ଴ Figure 8. ACT without Split Figure 8. shows aSplit system with one attack event, n detection The corresponding expression 9 detected, or attack was detected but not successfully mitigated. PGoal= (1/2) {ܲ‫ܣ‬ሺ1 െ ሺ1 െ ∏ ሺ1௠ ௜ୀ଴ Figure 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, one attack event, n detection events, and n mitigation events. The corresponding the probability of a successful attack, either attack was not attack was detected but not successfully mitigated. ሺ െ ܲ‫݅ܦ‬ሻሻሻ ൈ ሺ1 െ ∏ ሺ1 െ ܲ‫݅ܯ‬ሻሻሻ௡ ௜ୀ଴ Figure 8. ACT without Split-protocol for multiple detection and mitigation events [ system with one attack event, n detection events, and n mitigation The corresponding expression 9 shows the probability of a successful attack; either attack or attack was detected but not successfully mitigated. ሺ1 െ ܲ‫݅ܦ‬ሻሻሻ ൈ ሺ1 െ ∏ ሺ1 െ ܲ‫݅ܯ‬ሻሻሻ௡ ௜ୀ଴ } 9 Figure 9. Equivalent ACT for figure 8 with Split-protocol International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 106 and n mitigation events. The corresponding attack was not detected or (8) events [1]. mitigation events. either attack was not } 9
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Figure 10. shows one attack event, n pairs of detection event and mitigation event. The corresponding expression is displayed Figure 10. ACT without Split Figure 11. shows ACT structure with event and mitigation event. The corresponding expression 11 successful attack. PGoal = ½ܲ‫ܣ‬ ∏ ሺ1 െ ܲ‫݅ܦ‬ ൈ ܲ‫݅ܯ‬௡ ௜ୀ଴ Figure 11. ACT with Split International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Figure 10. shows one attack event, n pairs of detection event and mitigation event. The displayed by the equetion 10 for the probability of successful attack. PGoalܲ‫ܣ‬ ∏ ሺ1 െ ܲ‫݅ܦ‬ ൈ ܲ‫݅ܯ‬ሻ௡ ௜ୀ଴ 10 Figure 10. ACT without Split-protocol formultiple pairs of detection and mitigation events [ Figure 11. shows ACT structure with asplit system with one attack event, n pairs of detection event. The corresponding expression 11 displays the probability of ܲ‫݅ܯ‬ሻ11 Figure 11. ACT with Split-protocol for multiple pairs of detection and mitigation events. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 107 Figure 10. shows one attack event, n pairs of detection event and mitigation event. The the probability of successful attack. events [1]. , n pairs of detection the probability of pairs of detection and mitigation events.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, 7.QUALITATIVE AND 7.1 Probabilistic Analysis Table I. Gate Type AND gate OR gate k/n gate* *for identical inputs [1] Figure 12, illustartes adirect attack tree for resetting the BGP session top eventis connected with the set of all mincuts.Mincuts ofAT represent attack scenarios [ whereas those of an ACT, represent attack Figure 12. A straightforward Top= {{[(A1121+A1122+A1123) + (A International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, AND QUANTITATIVE ANALYSIS WITH Table I. methods for probability of attack success Gate Type Prob. of attack success AND gate ෑ ‫݌‬ሺ݅ሻ ௡ ௜ୀଵ 1 െ ෑሺ1 െ ‫݌‬ሺ݅ሻሻ ௡ ௜ୀଵ ෎ ൬ ݊ ݆ ൰ ‫݌‬௝ ∗ ሺ1 െ ‫݌‬ሻ௡ି௝ ௡ ௃ୀ௞ *for identical inputs [1] attack tree for resetting the BGP session. In both AT and ACT, the with the set of all mincuts.Mincuts ofAT represent attack scenarios [ whereas those of an ACT, represent attack-countermeasure scenarios straightforward attack tree for resetting the BGP session [1] (A111)]}. [(D12).M12). (A12)].(D1.M1)} + {(D2.M2).A2)}} International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 108 WITH ACT In both AT and ACT, the with the set of all mincuts.Mincuts ofAT represent attack scenarios [1, 26] )}}
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, Some of the Boolean algebra laws are i. Commutative Law (a) A + B = B + A (b) A B = B A ii. Associative Law (a) (A + B) + C = A + (B + C) (b) (A B) C = A (B C) iii. Distributive Law (a) A (B + C) = A B + A C (b) A + (B C) = (A + B) (A + C) iv. Identity Law (a) A + A = A (b) A A = A v.Redundancy Law (a) A + A B = A (b) A (A + B) = A Figure 13. An attack International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, laws are. (b) A + (B C) = (A + B) (A + C) attacktree with Split-protocol for resetting the BGP session International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 109
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 110 TOP = {{[(A1121+A1122+A1123)+(A111)]}.{[(D12).M12).(A12)].(D1.M1)}+{(D2.M2).A2)}} *{{[(A1121+A1122+A1123)+(A111)]}.[(D12).M12).(A12)].(D1.M1)} +{(D2. M2).A2)}} vi. Applying the Identity Law A.A = A = {{[(A1121+A1122+A1123) + (A111)]}. [(D12).M12). (A12)].(D1.M1)} + {(D2.M2).A2)}} Split Protocol: Failure Rate and Survival Function The distribution of each protocol component is the binomial distribution. With the number protocol of component n approach infinity, distribution of each component is poison distribution [4] with arrival rate, λ that is equal to the receiving rate of each component. Thus, service time or failure rate (FR) of each element is an exponential distribution [3]. 1. All the n components service time X is exponentially distributed: F (T) = P {X≤T} = 1- e-λT; f (T) = λe-λT 2. Each ith component1 ≤ i ≤ n, Failure Rate (FR) is constant.(,λi(t)= λi) 3. All n components are identical. Then FR of each element is equal to λ (λi = λ; 1 ≤ i ≤ n) 4. All n components are independent. Then 5. P {X1, X2...Xn> T} = P{X1>T} P{X2>T}…P{Xn>T} 6. The reliability of each component, Ri(T) is a. Ri (T) = P {Xi> T} = e-λT b. λ = -ln (Ri (T))/T c. T denoted system mission time. 7. System failure rate is 1 – R (T) where R (T) indicated the reliability of the whole system. There are supposed "n” protocol components and probability of non-failure (of each component(x1, x2, x3, x4...) are exponentially distributed: For simplicity we will assume, every i^th component 1 ≤ i ≤ n probability of failure is equal to all component, i.e. Failure Rate (FR) for each component is same and (θi (τ) = θi). For given operational time and all system, components are identical and their failure time is independent. Therefore, the reliability of, any ithcomponent (1 <i< n) reliability "Π i(τ)": "Π i(τ)" = P(Xi> τ) = ݁஘୧த =>θi =-ln(Π i(τ))/ τ . First, we have assumed identical components, which are identical DS in a cluster System, and they have same FR. Also, they are independent components those whose failure does not affect the performance of any other system component [2].
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 111 Reliability of Parallel identical components: Π S =1-(1 - Π 1) × (1 - Π 2) ×... (1 - Π n); if the component reliabilities differ Π S =1-(1 - Π) × (1 - Π) ×... (1 - Π); if the component with similar reliability 1-[1 - Π ]n For example system of two parallel components (CS, DS) Π τ =1-{(1-Π 1(τ)) (1-Π 2(τ))} = 1- {(1- ݁ିθଵτ ) ( 1 − ݁ିθଶτ )} = ݁ିθଵτ +݁ିθଶτ - ݁ି(θଵାθଶሻτ And MTTF = µ =‫׬‬ ߨ (ܶ ∝ ଴ ሻ݀τ= ‫׬‬ (݁ିθଵτ + ݁ିθଶτ − ݁ି(θଵାθଶሻτ∝ ଴ ሻ݀τ = ଵ θଵ + ଵ θଶ - ଵ θଵାθଶ And FR = θs = Density Function / Survival Function = - ௗ ௗ௧ ߨ (τሻ / Π (τ) =(θ1݁ିθଵτ + θ2݁ିθଶτ – ( θ1 + θ2ሻ݁ି(θଵାθଶሻτ /(݁ିθଵτ + ݁ିθଶτ − ݁ି(θଵାθଶሻτ )(22) This system hazard rate θs(τ) can be calculated as a function of any mission time τ [3]. 7.2 Mincut Analysis According to Roy, et al, the mincuts (attack alleviationscenarios) of the ACT in Figure10 are {(A111, CM1, A12, CM12), (A1121, CM1, A12, CM12), (A1122, CM1, A12, CM12), (A1123, CM1, A12, CM12), (A2, CM2)} (where CM1= (D1M1), CM12= (D12M12), M2= (D2M2))[1]. Each of the 5 mincuts corresponds to a permutation of actionseach of happening will result in attack hit at the target. For example, the mincut (A1122, CM1, A12, CM12) indicates that iftogether the attack events A1122 and A12 were to take place and if both the defense activity CM1 and CM12 fail, attack will be successful. From the mincut (A1122, CM1, A12, CM12) we also observe that the pair of attack events (A1122, A12) is covered by either of the countermeasures CM1 or CM12 [1]. 7.3 Qualitative Analysis: Minimal cut set (mincut): a minimum combination of primary events that induce the top event Introducing Split-protocol increase length of mincut, which signals low vulnerability. The split does not introduce additional new cut sets. This implies that the inclusion of split system does not introduce additional vulnerability in the overall system. Split- protocol reduces thechance of a single point of failure. Spilt –protocol introduces n parallel components, to fail system all n component must be faulty. The splitprotocol offers inbuilt architecture reliability and fault tolerance against DoS/DDoS attack [8].
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 112 8.CONCLUSION In this paper,we have presented the attack countermeasure trees (ACT) with implementing, a non- state-space representation that permits us to perform qualitative and probabilistic analysis of the security of the system. ACT takes into account attacks as well as countermeasures (in the form of detection mechanisms and mitigation techniques). The detection and mitigation can be placed not just at the leaf node but also at any intermediate node. When we implement the Split-protocol in thesystem, it reduces the probability of system failure by 50%. If thesystemis made of n split unit, system reliability will improve by n times. The innovative splitting system and associated Web server architecture introduced in this paper have potential applications in distributed computing and improving server reliability. REFRENCES [1] Roy, Arpan, Dong Seong Kim, and Kishor S. Trivedi. "Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. “Security and Communication Networks 5.8 (2012): 929-943. [2] Roy, Arpan, Dong Seong Kim, and Kishor S. Trivedi. "Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees." Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on. IEEE, 2012. [3] B.Rawal, R. Karne, and A. L. Wijesinha. “Splitting HTTP Requests on Two Servers.” The Third International Conference on Communication Systems and Networks: COMPSNETS 2011, January 2011, Bangalor, India. [4] B. Rawal, R. Karne, and A. L. Wijesinha. “Mini Web Server Clusters based on HTTP Request Splitting” HPCC 2011 : The 13th IEEE International Conference on High Performance Computing and Communications ,Sep 2, 2011- Sep 4, 2011, Banff, Canada. [5] Rawal, Bharat, et al. "Split-Encoding: The Next Frontier Tool for Big Data."Advanced Computing, Networking and Informatics-Volume 1. Springer International Publishing, 2014. 501-510. [6] START Understanding Series and Parallel Systems Reliability, Selected Topics in Assurance Related Technologies, volume 11, Number 5 (34) [7] Sheldon M. Ross, A First Course In Probability, Eighth Edition [8] Resistant Augmented Split Architecture,” IEEE 10th HONET- CNS , EMU, Famagusta, Cyprus 2013. [9] Espedalen, Jeanne H. "Attack trees describing security in distributed internet-enabled metrology." (2007). [10] Leveson, N. G. 1995. Safeware: System Safety and Computers. Addison-Wesley,Reading MA. [11] Viega, J. & McGraw, G. 2002. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley. [12] Ortalo R, Deswarte Y, Kaˆaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. on Software Engineering 1999; 25(5):633– 650. [13] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New York, NY, USA, 2000. [14] Trivedi KS, Kim DS, Roy A,Medhi D. Dependability and security models. Proc. DRCN, IEEE, 2009; 11– 20. [15] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New York, NY, USA, 2000. [16] Schneier B. Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons Inc., New York, NY, USA, 2000. [17] J.D. Weiss, A System Security Engineering Process, Proceedings of the 14th National Computer Security Conference, 1991
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 113 [18] Edward G. Amoroso, Fundamentals of Computer Security Technology, pp 15-29, Prentice-Hall, 1994, ISBN01310892935 [19] B. Schneier, Attack Trees, Dr. Dobb's Journal, v. 24, n. 12, December [20] Moore AP, Ellison RJ, Linger RC. Attack Modelingfor Information Security and Survivability.CMU/SEI-2001-TN-001 2001. [21] Mauw S, Oostdijk M. Foundations of Attack Trees.LNCS2006; 3935:186–198 [22] Daley K, Larson R, Dawkins J. A StructuralFramework for Modeling Multi-stage Network Attacks. Proc. ICPPW, 2002; 1530–1536. [23] D. Zagorodnov, K. Marzullo, L. Alvisi and T.C. Bressourd, “Practical and low overhead masking of failures of TCP-based servers,” ACM Transactions on Computer Systems, Volume 27, Issue 2, Article 4, May 2009. [24] K. Sultan, D. Srinivasan, D. Iyer and L. lftod. “Migratory TCP: Highly Available Internet Services using Connection Migration,” Proceedings of the 22nd International Conference on Distributed Computing Systems, July 2002. [25] G. Canfora, G. Di Santo, G. Venturi, E. Zimeo and M.V.Zito, “Migrating web application sessions in mobile computing,” Proceedings of the 14th International Conference on the World Wide Web, 2005, pp. 1166-1167. [26] T. Venton, M. Miller, R. Kalla, and A. Blanchard, “A Linux-based tool for hardware bring up, Linux development, and manufacturing,” IBM Systems J., Vol. 44 (2), IBM, NY, 2005, pp. 319-330.Gan Z, Tang J, Wu P, Varadharajan V. A NovelSecurity Risk Evaluation for Information Systems.Proc. FCST, 2007; 67–73. Author Dr. Bharat Rawal, has conducted research in the area of computer networks, including wireless networks, Split- protocol designs and analyzes, and network performance evaluations, HPC and Network security. He was the author and co-author in several papers in networking and security area. Currently, he has focused on solving a big integers and data compression in Split-protocol infrastructure. He is now server as Assistant Professor in IST department at Penn State Abington and Visiting Assistant Professor in the department of Electrical and Computer Engineering at Duke University.