SECURE-RM: Security and Resource Management for Dynamic Real-Time Systems

نویسندگان

  • Brett Tjaden
  • Lonnie Welch
  • Shawn Ostermann
  • David Chelberg
  • Ravindra Balupari
  • Marina Bykova
  • Aaron Mitchell
  • Lu Tong
چکیده

The global Internet has made real-time computer systems world-wide vulnerable to an ever-changing array of attacks for which current defense mechanisms are insufficient. In order to combat intruders in this new environment new techniques must be developed that enable decision makers to detect unusual behavior in their systems, correlate anomalies into higher-level attacker goals, plan appropriate response actions and execute their plans. We are developing SECURE-RM, a security management system that combines an intrusion detection system (INBOUNDS) with adaptive resource management middleware (DeSiDeRaTa) for this purpose. INBOUNDS is a network-based, real-time, hierarchical software system for misuse and anomaly detection. Intrusion events, such as pre-attack probes and denial of service attacks, are detected and are reported to SECURE-RM, which employs artificial intelligence techniques for deriving impacts of attacks on operational functions and mission goals. A strong belief in an attack strategy triggers a resource reallocation by DeSiDeRaTa for response execution. 1. Overview of SECURE-RM Figure 1 depicts an overview of the SECURE-RM architecture, which will be used to describe our approach for providing security and resource management for dynamic real-time systems. INBOUNDS notifies SECURE-RM of individual intrusion events. This information is combined with knowledge of the software system attributes and the hardware system attributes [1], and information about the current allocation of (hardware) resources to the software systems [1] to ascertain the adversary’s strategic goals. The results of the analysis are presented to the decision maker in terms pertaining to system structure, QoS and mission goals. Resource & QoS Monitoring Secure-RM adversary’s strategic goals, action advice, metrics queries re-allocation actions QoS & resource metrics intrusion events Decision maker Resource Control INBOUNDS: intrusion detection svcs. DeSiDeRaTa Figure 1 – The Architecture of SECURE-RM Upon perception of an attack, a set of reflexive actions is developed by SECURE-RM. The action development strategy first considers defensive mechanisms to achieve catharsis; if these are deemed inadequate, appropriate system functional realignments are discovered by assessing QoS and resource utilization (current and projected), as well as knowledge of the software system attributes and the hardware system attributes. The actions are recommended to the human decision maker, who may approve a recommended strategic reflex action, or may make queries to determine if alternate reflexes would be more appropriate. Upon selection of a particular strategic action, SECURE-RM considers QoS and resource utilization to determine a detailed set of reallocation operations to enact the stratagem, and dispatches the set of operations to the resource control component. For a more detailed understanding of our approach, consider the internal view of the SECURE-RM component shown in Figure 2. The primary architectural components of the SECURE-RM architecture are (1) attack strategy analyzer, (2) action advisor, (3) allocation optimizer, and (4) the hierarchical belief network. attack strategy analyzer

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DynBench: A Benchmark Suite for Dynamic Real-Time Systems

In this paper we present the architecture and framework for a benchmark suite that has been developed as part of the DeSiDeRaTa project. The benchmark suite is representative of the emerging generation of distributed, mission-critical, real-time control systems that operate in dynamic environments. Systems that operate in such environments may have unknown worstcase scenarios, may have large va...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

DynBench: A Dynamic Benchmark Suite for Distributed Real-Time Systems

In this paper we present the architecture and framework for a benchmark suite that has been developed as part of the DeSiDeRaTa project. The proposed benchmark suite is representative of the emerging generation of distributed, mission-critical, real-time control systems that operate in dynamic environments. Systems that operate in such environments may have unknown worst-case scenarios, may hav...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

A Dynamic Approach for Honeypot Management

Honeypot is a security device the value of which lies mainly in discovering and inspecting, being attacked and being at risk. Most of the present Honeypots are configured and installed on the network statically. In some cases considerations have been made on dynamic configuration of Honeypots at the time of installation but still no study have been carried out on how to instantaneously change t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000