Title :
Balancing safety against performance: tradeoffs in Internet security
Author :
Ha, Vu A. ; Musliner, David J.
Author_Institution :
Honeywell Technol. Center, Minneapolis, MN, USA
Abstract :
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple script-kiddies to highly sophisticated criminal enterprises. In response to these threats, sites must perform extensive intrusion monitoring. This intrusion monitoring can have significant costs in terms of bandwidth, computing power, storage space, and licensing fees. Furthermore, when exploits are detected, the victims must take actions that can consume further resources and compromise their objectives (e.g., by reducing e-commerce server throughput). In this paper, we explore techniques for modeling the costs and benefits of various security monitoring and response actions. Given these models and stochastic expectations about the types of attacks that a site is likely to face, our CIRCADIA (cooperative intelligent real-time control architecture for dynamic information assurance) automatic security control system is able to make real-time tradeoffs between the level of safety and security that is enforced, and the level of system resources/performance that are applied to the main computational objectives (e.g., e-commerce transactions). We show how CIRCADIA is able to dynamically adjust its security activities to account for changing threat profiles and objectives. The result: a continually-optimized balance of security-maintaining activity that reduces risk while still allowing the system to meet its goals.
Keywords :
Internet; electronic commerce; monitoring; security of data; telecommunication security; ClRCADlA; Internet security; Internet-accessible computing systems; automatic security control system; computing power; cooperative intelligent architecture; cooperative intelligent real-time control architecture for dynamic information assurance; costs modeling; e-commerce server throughput; e-commerce transactions; intrusion monitoring; licensing fees; real-time tradeoffs; response actions; risk reduction; script-kiddies; security activity; security monitoring; security-maintaining activity; sophisticated criminal enterprises; stochastic expectations; storage space; system performance; system resources; threat profiles; Bandwidth; Costs; Face detection; Information security; Internet; Licenses; Monitoring; Power system security; Real time systems; Safety;
Conference_Titel :
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
Print_ISBN :
0-7695-1874-5
DOI :
10.1109/HICSS.2003.1174465