Bend, Don’t Break: Using Reconfiguration to Achieve Survivability
نویسندگان
چکیده
Our national interests are becoming increasingly dependent on the continuous, proper functioning of large-scale, heterogeneous, and decentralized computing enterprises. Examples of such systems abound, ranging from military command and control to vital national security assets such as the financial and banking system. They are formed from large numbers of components originating from multiple sources, some trusted and some not, assembled into complex and dynamically evolving structures. Protecting these interests is critical, yet their sheer scale and diversity has gone far beyond our organizational and technical abilities to protect them. Manual procedures— however well designed and tested—cannot keep pace with the dynamicity of the environment and cannot react to security breaches in a timely and coordinated fashion, especially in the context of a networked enterprise. We are designing a secure, automated framework for proactive and reactive reconfiguration of large-scale, heterogeneous, distributed systems so that critical networked computing enterprises can tolerate intrusions and continue to provide an acceptable level of service. Proactive reconfiguration adds, removes, and replaces components and interconnections to cause a system to assume postures that achieve enterprise-wide intrusion tolerance goals, such as increased resilience to specific kinds of attacks or increased preparedness for recovery from specific kinds of failures. Proactive reconfiguration can also cause a relaxation of tolerance procedures once a threat has passed, in order to reduce costs, increase system performance, or even restore previously excised data and functionality. In a complementary fashion, reactive reconfiguration adds, removes, and replaces components and interconnections to restore the integrity of a system in bounded time once an intrusion has been detected and the system is known or suspected to have been compromised. Recovery strategies made possible by reactive reconfiguration include restoring the system to some previously consistent state, adapting the system to some alternative non-compromised configuration, or gracefully shedding non-trustworthy data and functionality. In our view, proactive and reactive reconfiguration are two sides of the same coin that can be profitably unified into a coherent and comprehensive survivability mechanism.
منابع مشابه
Community protests Iraq conflict Over 40 students , residents gather in anti - violence demonstration
South Bend landlord Mark Kramer hired a private security company Friday to patrol his more than 150 properties after recent car break-ins. “We’ve had some car breakins and one is too many as far as I’m concerned,” he said. “I just haven’t had much cooperation with the police d epartm en t when we’ve had problems. ... Safety is very im portant, so I made the decision to hire a pri vate company....
متن کاملThe Willow Survivability Architecture
Introduction The Willow architecture provides a comprehensive architectural approach to the provision of survivability [8] in critical information networks. It is based on the notion that survivability of a network requires reconfiguration at both the system and the application levels. The Willow notion of reconfiguration is very general, and the architecture provides reconfiguration mechanisms...
متن کاملService-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration
Command and Control (C2) systems are evolving as warfighting is changing. Modern warfighting needs a dynamic, adaptable and agile force supported by rapidly changing technology. Three important C2 system characteristics are: survivability, rapid development and evaluation, and interoperability. This paper proposes a Service-Oriented Architecture with Dynamic Reconfiguration (SOADR) for the DoD ...
متن کاملFault-Mitigation by Adaptive Dynamic Reconfiguration for Survivable Signal-Processing Architectures
We present an area-efficient dynamic fault-handling approach to achieve high survivability for DSP circuits. Fault detection, isolation, and recovery are performed using discrepancy information derived from the existing functional throughput by reconfiguring one of the N + 1 Reconfigurable Partitions (RPs) to replicate each of the N modules in succession. This differs significantly from the con...
متن کاملSimulation Environment for Performance Assessment of Reconfiguration Controls in Zonal Systems
All-electric warships will require intelligent control strategies where the behavior of individual electric plant subsystems and devices can be modified to meet the changing needs of the ship to achieve the high level of performance required for survivability. A computational environment for simulating the performance of the electrical system and underlying controls is an essential part of the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000