1. A Coloured Petri Nets Based Attack Tolerance Framework
- Author
-
Lina Ye, Philippe Dague, Lei Liu, Fatiha Zaïdi, Wenbo Zhou, Jilin University, Ministry of Education of China, Laboratoire Interdisciplinaire des Sciences du Numérique (LISN), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS), Modeling and Exploitation of Interaction and Concurrency (MEXICO), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Méthodes Formelles (LMF), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay)-CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay), IEEE, and CentraleSupélec-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Attack tolerance ,Computer science ,business.industry ,IT service continuity ,Data_MISCELLANEOUS ,020207 software engineering ,Medical information ,Cloud computing ,02 engineering and technology ,Petri net ,computer.software_genre ,Computer security ,Formal methods ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Web service ,business ,computer - Abstract
International audience; Web services provide a general basis of convenient access and operation for cloud applications. However, such services become very vulnerable when being attacked, especially in the situation where service continuity is one of the most important requirements. This issue highlights the necessity to apply reliable and formal methods to attack tolerance in Web services. In this paper, we propose a Coloured Petri Nets based method for attack tolerance by modelling and analysing basic behaviours of attack-network interaction, attack detectors and their tolerance solutions. Furthermore, complex attacks can be analysed and tolerance solutions deployed by identifying these basic attack-network interactions and composing their solutions. The validity of our method is demonstrated through a case study on attack tolerance in cloud-based medical information storage.
- Published
- 2020
- Full Text
- View/download PDF