1 Reliable Adaptive Distributed Systems Armando Fox, Michael Jordan, Randy H. Katz, David Patterson, George Necula, Ion Stoica, Doug Tygar.

Slides:



Advertisements
Similar presentations
End-to-End Arguments in System Design
Advertisements

ECE 720T5 Fall 2012 Cyber-Physical Systems Rodolfo Pellizzoni.
CSE 598B: Self-* Systems Path Based Failure and Evolution Management Mike Y. Chen, Anthony Accardi, Emre Kiciman, Jim Lloyd, Dave Patterson, Armando Fox,
Using Programmer-Written Compiler Extensions to Catch Security Holes Authors: Ken Ashcraft and Dawson Engler Presented by : Hong Chen CS590F 2/7/2007.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Software Engineering COMP 201
Vertically Integrated Analysis and Transformation for Embedded Software John Regehr University of Utah.
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
Transaction Processing IS698 Min Song. 2 What is a Transaction?  When an event in the real world changes the state of the enterprise, a transaction is.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Run-Time Error Handling Wes Weimer, George Necula.
November 18, 2004 Embedded System Design Flow Arkadeb Ghosal Alessandro Pinto Daniele Gasperini Alberto Sangiovanni-Vincentelli
1 A Research Program in Reliable Adaptive Distributed Systems (RADS) Armando Fox*, Michael Jordan, Randy Katz, George Necula, David Patterson, Ion Stoica,
Statistical Learning: Pattern Classification, Prediction, and Control Peter Bartlett August 2002, UC Berkeley CIS.
Router modeling using Ptolemy Xuanming Dong and Amit Mahajan May 15, 2002 EE290N.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Overview of Database Languages and Architectures.
1 SAHARA and OASIS Overviews NTT MCL Visit November 6, 2003 Randy H. Katz Computer Science Division Electrical Engineering and Computer Science Department.
Course Instructor: Aisha Azeem
Replay Debugging for Distributed Systems Dennis Geels, Gautam Altekar, Ion Stoica, Scott Shenker.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Software Testing Verification and validation planning Software inspections Software Inspection vs. Testing Automated static analysis Cleanroom software.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1 RADS Conceptual Architecture Commodity Internet & IP networks Edge Network Distributed Middleware Client SLT Services Distributed Middleware Server Router.
Software-Defined Networking - Attributes, candidate approaches, and use cases - MK. Shin, ETRI M. Hoffmann, NSN.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Chapter 18 Object Database Management Systems. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc. All rights reserved. Outline Motivation for object.
Writing Systems Software in a Functional Language An Experience Report Iavor Diatchki, Thomas Hallgren, Mark Jones, Rebekah Leslie, Andrew Tolmach.
Deconstructing Storage Arrays Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau University of Wisconsin,
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
System-level power analysis and estimation September 20, 2006 Chong-Min Kyung.
Gedae, Inc. Gedae: Auto Coding to a Virtual Machine Authors: William I. Lundgren, Kerry B. Barnes, James W. Steed HPEC 2004.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
Engineering Self-adaptive Service Mashups Mahdi Bashari LS3 Colloquium May 7 th 2014.
1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Using Symbolic PathFinder at NASA Corina Pãsãreanu Carnegie Mellon/NASA Ames.
1/12 Distributed Transactional Memory for Clusters and Grids EuroTM, Paris, May 20th, 2011 Michael Schöttner.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Data Mining and Decision Support
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
Software Quality Assurance and Testing Fazal Rehman Shamil.
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
Chapter 18 Object Database Management Systems. Outline Motivation for object database management Object-oriented principles Architectures for object database.
Middleware for Fault Tolerant Applications Lihua Xu and Sheng Liu Jun, 05, 2003.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Langley Research Center An Architectural Concept for Intrusion Tolerance in Air Traffic Networks Jeffrey Maddalon Paul Miner {jeffrey.m.maddalon,
SRA 2016 – Strategic Research Challenges Design Methods, Tools, Virtual Engineering Jürgen Niehaus, SafeTRANS.
SDN challenges Deployment challenges
CSCE 548 Secure Software Development Risk-Based Security Testing
Dynamo: A Runtime Codesign Environment
Types for Programs and Proofs
The Development Process of Web Applications
Albert M. K. Cheng Embedded Real-Time Systems
Software Architecture in Practice
Designing Software for Ease of Extension and Contraction
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
Software Defined Networking (SDN)
Software Architecture
The Vision of Autonomic Computing
Presentation transcript:

1 Reliable Adaptive Distributed Systems Armando Fox, Michael Jordan, Randy H. Katz, David Patterson, George Necula, Ion Stoica, Doug Tygar

2 Motivations and Observations Existing systems: –Fragile, easily broken, poor reliability/security –Overwhelming configuration complexity, infrequently correctly performed, yielding lack of dependability, significant vulnerabilities Magic bullets? –Statistical learning theory: foundation for algorithms that observe/predict future behaviors –Verification technology—check for correct behavior, reveal vulnerabilities, automatically generate behaviors with desirable properties –Programmable network elements—“active” code inserted into network, provide observation/enforcement points without access to user end systems

3 The Team and Approach Team: –Statistical Learning Theory (SLT) (Michael Jordan) –Network Services/Protocols (Armando Fox, Randy Katz, David Patterson, Ion Stoica) –Verification Methods for program, network, security behaviors (George Necula, Ion Stoica, Doug Tygar). Approach: comprehensive distributed system architecture –SLT building block/practical components for distributed system observation, coordination, inference, correction, and evolution of behaviors –Network behaviors and how they reveal operation of higher-level network applications –Key enabler: embed observational and inference means at strategic points in the network, avoiding modification of end hosts or apps (aka “knowledge plane”) –Apps: web services, intrusion detection, storage access, etc. Improvements: –Dependability enhanced by monitoring network state, rapidly detecting behavioral changes (e.g., failures), configuring new resources in response –Security enhanced thru more rapid discovery of and response to attacks

4 Old System Block the in-coming attack Contain outgoing attacks Patch here once Too difficult to apply patches here Old System Old System Old System Network is patched Block things rather than upgrade software! Not the end systems Network is smart Not the end systems Fragile to change, upgrade Secure the edge network Redundancy Isolation/Containment Heterogeneity

5 Make-A-Difference Technologies Statistical Learning Theory (Michael Jordan) –Toolbox for the design and analysis of adaptive systems –New and scaled-up algorithms for classification, diagnosis, prediction, novelty detection, outlier detection, quantile estimation, density estimation, feature selection, variable selection, response surface optimization, sequential decision-making »kernel machine: functional analysis plus convex optimization, yielding generalized inner product to measure similarities among data point pairs »novelty detection/quantile estimation problems: given cloud of data in feature space, place boundary so as to guarantee only small fraction falls outside (second-order cone program— convex optimization with efficient solution methods) –Challenge: make these algorithms work “on-line” while embedding them within network and distributed systems architectures

6 Make-A-Difference Technologies New Approach to Run-Time Error Handling (George Necula) –Program-level error-handling is difficult »Repetitive, hard to maintain and specify »Standard run-time approach is abort or ignore! –Necula’s approach »Add explicit support at the programming language level »Make compensations and interface obligations First-class citizens (like objects) With Static and Dynamic checking »Handles tricky features (e.g., loops, the heap) »Still provides strong guarantees Like sagas or compensating transactions Standard transactions not appropriate for this use

7 Implementation Platform based on Programmable Networks Interconnection Fabric Input Ports Output Ports Buffers Tag Mem CP AP Action Processor CP Classification Processor Rules & Programs

8 Short Statements Patterson/Fox: Dependability of Distributed Systems Stoica: Trust in Distributed Systems through Protocol Verification Tygar: Security in Distributed Systems