Home » Research on Key Technologies of Networked Information System and Different Techniques of Survivability

Research on Key Technologies of Networked Information System and Different Techniques of Survivability

Shaikh Faryal Rashid


Department of Computer Science and Technology,

Harbin University of Science and Technology, P. R. China.


Building secure, enabling a system to tolerate subtle attacks, guaranteeing data integrity servers is becoming increasingly an unattainable goal. To capture the essence of survivability, we must first consider that intrusion is, in fact, a malicious fault that has two underlying causes:  weakness, flaw, or vulnerability or a malicious attack or act that attempt to exploit former. Therefore in this paper many threats and problems have been outlined and evaluated as a set of operating systems and applications that intrusion tolerance, recovery  (self-restoration) method is usually the only viable way of improving the system’s dependability and security in the presence of continuously evolving threats. “Intrusion Prediction” “Intrusion Detection” “Attack Resistance” and “System Recovery” are the major technology used for protecting information system. This paper presents survival approach for attacks from Web Services and other means. The tentative research shows that the proposed approach results in better performance of System, as well as increasing the capacity of diagnosing and reducing the service unavailability during an intrusion, because survivability is overall known as an approach to complete its mission in timely manner even in critical condition and in presence of intrusion or attack. This defense mechanism focuses on detect, prevent, tolerate and response, the attack symptoms as well as diagnosis of intrusion effects in order to perform a proper reaction only if attack succeeds. The research on survivability techniques in this paper focuses in providing a good level of services, even when the system is partially compromised. This research approaches to premise that a system’s architecture can ensure intrusion tolerance and meet the requirements of users. Overall, this work mainly elaborates the key problems of survivability research and its techniques.


Network information system,

Intrusion tolerance,


Self-restoration and security

Cited as

Shaikh Faryal Rashid “Grid Research on Key Technologies of Networked Information System and Different Techniques of Survivability,” International Journal of Advanced Engineering and Management, Vol. 3, No. 1, pp. 17-23,  2018.

download pdfvol3no1paper4



  1. Liu, M., Feng, T., Smith, P., & Hutchison, D. (2013, May). Situational awareness for improving network resilience management. In International Conference on Information Security Practice and Experience(pp. 31-43). Springer, Berlin, Heidelberg.
  2. Zhang, Y., Zhang, H. L., & Fang, B. X. (2004). A survey on Internet topology modeling. Journal of Software15(8), 1220-1226.
  3. Laughlin, R. B., & Pines, D. (2000). From the Cover: The Theory of Everything. Proceedings of the National Academy of Sciences of the United States of America97(1), 28.
  4. Westmark, V. R. (2004, January). A definition for information system survivability. In System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on(pp. 10-pp). IEEE.
  5. Wang, J. L., Zhang, Y., & Yu, Z. W. (2009, December). Survivability Evaluation for Network Storage System Base on Gray Relation Analysis. In Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on(pp. 1-4). IEEE.
  6. Pahl, C., & Collins, L. (2015). Software service adaptation based on interface localisation. International Journal of Systems and Service-Oriented Engineering (IJSSOE)5(1), 16-34.
  7. Gao, R., Cao, B., Hu, Y., Feng, Z., Wang, D., Hu, W., … & Xu, X. (2013). Human infection with a novel avian-origin influenza A (H7N9) virus. New England Journal of Medicine368(20), 1888-1897.
  8. Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., & Longstaff, T. (1997). Survivable network systems: An emerging discipline(No. CMU/SEI-97-TR-013). Carnegie-mellon Univ Pittsburgh PA Software Engineering Inst.
  9. Ellison, R. J., Linger, R. C., Longstaff, T., & Mead, N. R. (1999). Survivable network system analysis: a case study. IEEE software16(4), 70-77.
  10. [Linger, R. C., Lipson, H. F., McHugh, J., Mead, N. R., & Sledge, C. A. (2002). Life-cycle models for survivable systems.
  11. Linger, R. C., Lipson, H. F., McHugh, J., Mead, N. R., & Sledge, C. A. (2002). Life-cycle models for survivable systems.
  12. Jha, S., Wing, J., Linger, R., & Longstaff, T. (2000). Survivability analysis of network specifications. In Dependable Systems and Networks, 2000. DSN 2000. Proceedings International Conference on(pp. 613-622). IEEE.
  13. Guo, Y. B., & Ma, J. F. (2002). Quantifying survivability of services in distributed system. JOURNAL-TONGJI UNIVERSITY30(10), 1190-1193.
  14. Gao, Z. X., Ong, C. H., & Tan, W. K. (2001). Survivability assessment: modelling dependencies in information systems. In Proceeding of 4th IEEE/CMU/SEI Information Survivability Workshop(Vol. 8). Vancouver, Canada.
  15. Yanji, J., & Fenggang, H. (2009, December). The Research of System Survivability Architecture Based on Immunity Principle. In Information Science and Engineering (ISISE), 2009 Second International Symposium on(pp. 313-317). IEEE.
  16. Wang, H., Liu, P., & Li, L. (2007). Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies. International Journal of Information and Computer Security1(3), 315-340.
  17. Mattsson, U. T. (2004). A practical implementation of a real-time intrusion prevention system for commercial enterprise databases. WIT Transactions on Information and Communication Technologies33.
  18. Valdes, A., & Skinner, K. (2001, October). Probabilistic alert correlation. In International Workshop on Recent Advances in Intrusion Detection(pp. 54-68). Springer, Berlin, Heidelberg.
  19. Maheshwari, U., Vingralek, R., & Shapiro, W. (2000, October). How to build a trusted database system on untrusted storage. In Proceedings of the 4th conference on Symposium on Operating System Design & Implementation-Volume 4(p. 10). USENIX Association.
  20. Liu, M., Tornatore, M., & Mukherjee, B. (2013). Survivable traffic grooming in elastic optical networks—Shared protection. Journal of lightwave technology31(6), 903-909.
  21. Waite, J., Benke, M., Nguyen, N., Phillips, M., Melton, S., Oman, P., … & Johnson, B. K. (2004, October). A combined approach to ITS vulnerability and survivability analyses. In Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on(pp. 262-267). IEEE.Moore, A. P., Ellison, R. J., & Linger, R. C. (2001). Attack modeling for information security and survivability(No. CMU-SEI-2001-TN-001). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
  22. Taylor, C., Krings, A., & Alves-Foss, J. (2002, November). Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening. In  ACM Workshop on Scientific Aspects of Cyber Terrorism,(SACT), Washington DC(Vol. 64).
  23. McDermott, J. (2005, March). Attack-potential-based survivability modeling for high-consequence systems. In Information Assurance, 2005. Proceedings. Third IEEE International Workshop on(pp. 119-130). IEEE.steakhouse-1
%d bloggers like this: