Survivability through Customization and Adaptability: The Cactus Approach

نویسندگان

  • Matti A. Hiltunen
  • Richard D. Schlichting
  • Carlos A. Ugarte
  • Gary T. Wong
چکیده

Survivability, the ability of a system to tolerate intentional attacks or accidental failures or errors, is becoming increasingly important with the extended use of computer systems in society. While techniques such as cryptographic methods, intrusion detection, and traditional fault tolerance are currently being used to improve the survivability of such systems, new approaches are needed to help reach the levels that will be required in the near future. This paper proposes the use of fine-grain customization and dynamic adaptation as key enabling technologies in a new approach designed to achieve this goal. Customization not only supports software diversity, but also allows customized tradeoffs to be made between different QoS attributes including performance, security, reliability, and survivability. Dynamic adaptation allows survivable services to change their behavior at runtime as a reaction to anticipated or detected intrusions or failures. The Cactus system provides support for both finegrain customization and dynamic adaptation, thereby offering a potential solution for building survivable software in

منابع مشابه

The Bio-Networking Architecture: A Biologically Inspired Approach to the Design of Scalable, Adaptive, and Survivable/Available Network Applications

We believe that the challenges faced by future network applications, such as scalability, adaptability, and survivability/availability, have already been overcome by large scale biological systems and that future network applications will benefit by adopting key biological principles and mechanisms. Our initial effort at applying biological principles and mechanisms to the design and implementa...

متن کامل

Using Redundancy to Increase Survivability

Secure communication services—that is, communication services that provide attributes such as confidentiality, integrity, and authenticity—typically implement each attribute using a single method for each connection. For example, confidentiality may be provided by DES and integrity by keyed MD5. Although such an approach may be secure in the traditional sense, it is not survivable—once a method...

متن کامل

Providing QoS Customization in Distributed Object Systems

Distributed applications are increasingly using distributed object platforms such as CORBA, DCOM, and Java RMI to standardize object interactions. With this increased use comes the increased need for providing enhanced Quality of Service (QoS) attributes related to fault tolerance, security, and timeliness. This paper describes an approach to implementing such enhancements in a transparent, hig...

متن کامل

Evaluating Knowledge Management Tools on the Basis of Customization using Fuzzy Approach

Today’s world economy situation forces enterprise organizations toward more soft and flexible organization, management, and production processes. They need to explore the most suitable Knowledge Management (KM) tool not only to identify gaps and overlaps but also to maintain and support innovation cross organizations. In this study, a multiple-experts-multiple-criteria decision making model is ...

متن کامل

Providing Adaptability in Survivable Systems through Situation Awareness

System integration, interoperability, just in time delivery, window of opportunity, and dust-to-dust optimization are all keywords of our computerized future. Survivability is an important concept that together with dependability and quality of service are key issues in the systems of the future, i.e. infrastructural systems, business applications, and everyday desktop applications. The importa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000