Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation.

Slides:



Advertisements
Similar presentations
Tivoli Software from IBM Storage Resource Management Webcast
Advertisements

Protecting Software Code By Guards - by Hoi Chang and Mikhail J. Atallah “Many software-based mechanisms for protecting program code are too weak[…] or.
Self-Managing Anycast Routing for DNS
Enterprise Architectures
Autonomic Systems Justin Moles, Winter 2006 Enabling autonomic behavior in systems software with hot swapping Paper by: J. Appavoo, et al. Presentation.
Chapter 19: Network Management Business Data Communications, 5e.
KAIS T The Vision of Autonomic Computing Jeffrey O. Kephart, David M Chess IBM Watson research Center IEEE Computer, Jan 발표자 : 이승학.
Welcome to DEAS 2005 Design and Evolution of Autonomic Application Software David Garlan, CMU Marin Litoiu, IBM CAS Hausi A. Müller, UVic John Mylopoulos,
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Fabián E. Bustamante, Winter 2006 Autonomic Computing The vision of autonomic computing, J. Kephart and D. Chess, IEEE Computer, Jan Also - A.G.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
SysMA S OFTWARE E NGINEERING FOR S ERVICE - O RIENTED AND A UTONOMIC S YSTEMS - I NTRODUCTION TO A UTONOMIC S YSTEMS - Lucca (Italy) – October, 2014 Francesco.
Yingping Huang and Gregory Madey University of Notre Dame A W S utonomic eb-based imulation Presented by Tariq M. King Published by the IEEE Computer Society.
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Autonomic Computing Shafay Shamail Malik Jahan Khan.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B4 Enterprise Architecture.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lecture 11 Reliability and Security in IT infrastructure.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
(Slides are taken from the presentations by Alan Ganek, Alfred Spector, Jeff Kephart of IBM)
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
A Concise Introduction to Autonomic Computing
Hands-On Microsoft Windows Server 2008
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1 Autonomic Computing An Introduction Guenter Kickinger.
An Approach to Test Autonomic Containers Ronald Stevens (IEEE Computer Society & ACM Student Member) August 1, 2006 REU Sponsored by NSF.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Autonomic Computing Presented By: Renuka Kandimalla( )
Dr. Arun Sharma M.Tech., PhD (Thapar University)
WELCOME. AUTONOMIC COMPUTING PRESENTED BY: NIKHIL P S7 IT ROLL NO: 33.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
System Management for Virtualization and Automation in a Dynamic Data Center SVM’08 Munich Karsten Beins, Sen. Director Infrastructure Technology.
Sage Timberline Hosting
SelfCon Foil no 1 Design of Self-Adaptive Systems Course introduction 2013 Rolv Bræk, ITEM.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
1 Self-configuring of the User-centric Communication Middleware for the Communication Virtual Machine Sean Leslie Ricardo Tirado.
Integrated Systems Division Service-Oriented Programming Guy Bieber, Lead Architect Motorola ISD C4I 2000 OOPSLA Jini Pattern Language Workshop Guy Bieber,
Self-Managed Networks: Dream or Reality? Jawad Khaki Corporate Vice President Windows Networking & Device Technologies.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
A Systematic Survey of Self-Protecting Software Systems
A Self-Configuring Test Harness for Web Applications Jairo Pava School of Computing and Information Sciences Florida International University Courtney.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.
The Vision of Autonomic Computing Self-Management Unit 7-2 Managing the Digital Enterprise Kephart, and Chess.
Understand Malware LESSON Security Fundamentals.
David Foster LCG Project 12-March-02 Fabric Automation The Challenge of LHC Scale Fabrics LHC Computing Grid Workshop David Foster 12 th March 2002.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Information Security, Theory and Practice.
Self Healing and Dynamic Construction Framework:
Introduction.
CompSci Self-Managing Systems
Model-Driven Engineering for Mission-Critical IoT Systems
ASPECT ORIENTATED PROGRAMMING RESEARCH
The Vision of Autonomic Computing
Jigar.B.Katariya (08291A0531) E.Mahesh (08291A0542)
Self-Managed Systems: an Architectural Challenge
Presentation transcript:

Autonomic Systems Justin Moles, Winter 2006 Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation by: Justin Moles

2 The problem The main obstacle to further progress in IT industry –Not a change in Moore’s law, but –Looming software complexity crisis Beyond admin single environments, to integration into intra- and inter-corporate computing systems “Complexity is the business we are in, and complexity is what limits us.”, Fred Brooks Jr. Better programming won’t do it Consider –~1/3 to ½ of a company’s total IT budget goes to preventing and recovering from crashes –“For every dollar to purchase storage, you spend $9 to have someone manage it.”, N. Tabellion, CTO Fujitsu Softek –~40% of computer outages are caused by operator errors –Average downtime impact for IT ~ $1.4 millions revenue/hour

3 The answer/hope – Autonomic computing Autonomic systems – can manage themselves given high-level objectives from admins. ~ autonomic nervous system An autonomic system –Knows itself –Knows its environment & the context surrounding its activity –(Re) configure itself under varying and unpredictable conditions –Is always on the look to optimize its working –Is able to protect and heal itself –Anticipates the optimized resources needed to meet a user’s information needs To incorporate these characteristics, it must have the following properties/features …

4 Self-* properties Self-configuration –Current: Data centers made of components from/for multiple vendors/platforms; installation, configuration & integration is time consuming & error prone –Autonomic: Automated based high-level policies, host system adjust itself automatically and seamlessly Self-optimization –Current: Hundreds of manually set, nonlinear tuning knobs –Autonomic: Components and system continually seek optimization opportunities Self-healing –Current: e.g. problem determination can take weeks –Autonomic: self detection, diagnosis, and repair for HW&SW Self-protection –Current: Detection & recovery from attacks & cascading failures is manual –Autonomic: Self-defense using early warning to anticipate & prevent system-wide failures

5 Autonomic Architecture Combination of Autonomic Elements with Non-Autonomic Elements Autonomic Management Units Non-Autonomic Functional Units

6 Autonomic Security Elements High level security policies from System Admins Functional security elements – encryption, decryption, monitoring, analysis etc. Task and State Representations Configuration security

7 Issues Relevant in Autonomic Security Every issue currently relevant in computer security will continue to be so In addition new threats from autonomic elements will be added to the list Viruses and worms could be adapted to use autonomic elements for reproduction In addition the efficiency gained from autonomic elements can assist attackers as well as defenders

8 Autonomic Information Control Perhaps biggest issue for autonomic elements is informational control Certain elements have access to certain information – no more and no less Need to have a manageable interface to control this control is a key issue in computer security Added to this is privacy laws that often differ by country

9 Trust, Authorization, and Verification With autonomic elements able to set configuration settings, verification of their authority in a complex environment becomes important. Some elements will also be able to install new elements on their authority which will need to be checked for security Doing this for multiple elements can add up in cost and needs to be controlled and understood to increase the efficiency of the process

10 Example of Autonomic Security

11 Other examples Immune System – Antivirus software, antispyware software, and more rolled into one Secure Distributed Storage – Information is spread across several well protected units across the world, able to retrieved on notice.

12 Conclusion and My Opinion Autonomic system will make security even more important than it is currently However the potential exists for greater levels of security than before Overall the paper is a “Vision” paper full of concepts with no data within it.