Philip K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University RAPIDware:

Slides:



Advertisements
Similar presentations
Jeremy S. Bradbury, James R. Cordy, Juergen Dingel, Michel Wermelinger
Advertisements

Ethernet Switch Features Important to EtherNet/IP
Kernel-Middleware Interaction to Support Adaptation in Pervasive Computing Environments F. Samimi, P. McKinley, S. Sadjadi, P. Ge Software Engineering.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Reseach in DistriNet (department of computer science, K.U.Leuven) General overview and focus on embedded systems task-force.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
An Aspect-Oriented Approach to Dynamic Adaptation August 8, 2002 Presented by: Sherri Goings Advisors: Dr. Dillon, Dr. Cheng, Dr. Stirewalt SENS Lab
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
A given modeling and code generation framework Formalization of UML with Traceability Department of Computer Science & Engineering College of Engineering.
Department of Computer Science & Engineering College of Engineering Dr. Betty H.C. Cheng, Laura A. Campbell, Sascha Konrad The demand for distributed real-time.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Safe Dynamic Adaptation Department of Computer Science & Engineering Ji Zhang and Zhenxiao Yang Advisor: Prof. Betty H.C. Cheng Software Engineering and.
26th May, Middleware or Simulator for Autonomic Communications Yang Qiu Networking Laboratory Helsinki University of Technology
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Lecture 11 Intrusion Detection (cont)
Testing RAVEN Helmut Neukirchen Faculty of Industrial Engineering, Mechanical Engineering and Computer Science University of Iceland, Reykjavík, Iceland.
For further information: Infrastructure and Information Science Infrastructure: –Civil Infrastructure Engineering –Transportation.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Run-Time Support for Adaptive Communication Services By: SeyedMasoud Sadjadi Advisor: Dr. Philip K. McKinley Computer Science and Engineering Michigan.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
1 Autonomic Computing An Introduction Guenter Kickinger.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Univ. Notre Dame, September 25, 2003 Support for Run-Time Adaptation in RAPIDware Philip K. McKinley Software Engineering and Networking Systems Laboratory.
1 MERIDIAN and RAPIDware (and other SENS projects) Dr. Betty H.C. Cheng Software Engineering and Network Systems Lab Michigan State University
An Introduction to Software Architecture
L. Dillon Software Engineering & Network Systems Laboratory Michigan State University 1 Getting Results From Testing Laura K. Dillon Software Engineering.
Distributed Systems: Concepts and Design Chapter 1 Pages
A SENS Internal Presentation on Friday, October 3, 2003 TRAP Transparent Reflective Aspect Programming SeyedMasoud Sadjadi Supervised by Dr. McKinley
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
ONR Review – June 11, 2003 RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Philip McKinley, Kurt Stirewalt, Betty Cheng, Laura.
1 Javier Ocasio Pérez Mentor: Masoud Sadjadi Graduate Students: Fernando Trigoso Ana M. Sanchez Tuan Cameron Allen Lee A Remote Composer for TRAP.NET.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1 Mobile Networks logica Contents Confidential & Proprietary to Logica © 2001 Application-Level Active Networks Presented at Dublin Breakfast Briefing,
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
International Symposium on Distributed Objects and Applications (DOA 2002) MetaSockets MetaSockets Run-Time Support for Adaptive Communication Services.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 1: Characterization of Distributed & Mobile Systems Dr. Michael R.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Programming Sensor Networks Andrew Chien CSE291 Spring 2003 May 6, 2003.
1 010/02 Aspect-Oriented Interceptors Pattern 1/4/2016 ACP4IS 2003John Zinky BBN Technologies Aspect-Oriented Interceptors Pattern Dynamic Cross-Cutting.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
ENABLING ADAPTABILITY IN COMPOSITE SERVICES USING TRANSPARENT SHAPING TECHNIQUES Onyeka Ezenwoye Autonomic Computing Research Laboratory School of Computing.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
GYTE - Bilgisayar Mühendisliği Bölümü Bilgisayar Mühendisliği Bölümü GYTE - Bilgisayar Mühendisliği Bölümü AN ARCHITECTURE FOR NEXT GENERATION MIDDLEWARE.
Internet2 Applications Group: Renater Group Presentation T. Charles Yun Internet2 Program Manager, Applications Group 30 October 2001.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
CEN-4015, Software Project, Spring 2006 Transparent Shaping of Existing Software to Support Pervasive and Autonomic Computing S. Masoud Sadjadi Autonomic.
1 Javier Ocasio Pérez Mentor: Masoud Sadjadi Graduate Students: Fernando Trigoso Ana M. Sanchez Tuan Cameron Allen Lee A Remote Composer for TRAP.NET.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
IS3220 Information Technology Infrastructure Security
Dr. Ir. Yeffry Handoko Putra
Supporting Mobile Collaboration with Service-Oriented Mobile Units
OO Methodology OO Architecture.
CHAPTER 3 Architectures for Distributed Systems
Supporting Fault-Tolerance in Streaming Grid Applications
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
In Distributed Systems
Architectures of distributed systems Fundamental Models
Presentation transcript:

Philip K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University RAPIDware: Adaptive Software for Critical Infrastructure Protection

Critical Infrastructures Examples:  Electric power grids  Telecommunication networks  Water systems  Nuclear facilities, hydroelectric dams  Command and control networks  Financial networks, and so on… Managed by distributed computing facilities, connected to the Internet Hence, they are at risk of cyber attack. The consequences could be catastrophic.

RAPIDware Project Five-year, $3.1M project in CSE SENS Laboratory Funded by U.S Office of Naval Research  Adaptable Software / Critical Infrastructure Protection Program  Outgrowth of Presidential Decision Directive 63 (May ’98) Goal: Software (middleware) that can protect itself from:  Cyber attack  Hardware and software component failures  Changing environmental conditions  Dynamic application/user requirements (e.g. security policies) RAPIDware supports:  5 CSE faculty members  10 graduate research assistants Middleware for “Internet Speed” development and evolution of applications must support:  Multiple dimensions of adaptability  Autonomous execution of middleware components  Dynamic composition of middleware services “Principled” methods (compiler/language support, code generation, reflection, run-time checks, etc) needed to help ensure reliability, correctness, reusability, security

RAPIDware Investigators Phil McKinley - distributed computing, network protocols, adaptive middleware, anomaly detection Kurt Stirewalt - software analysis, interactive systems, model checking Laura Dillon - formal methods for concurrent systems, real- time systems Betty Cheng - software engineering, formal methods, object-oriented development Sandeep Kulkarni - fault tolerance, security

What is Middleware? Interconnected Computer Networks Distributed Computer Applications MIDDLEWARE (CORBA, J2EE,.NET,…) Internet Protocols (TCP/IP)

Adaptive Middleware Adaptive middleware can manage nonfunctional aspects of the system in coordinated fashion:  actively monitor the system, execute security policies  provide fault tolerance for specified components  adapt to changing environmental conditions  manage energy consumption in battery-powered devices  insulate the application from device/network differences “Always On” systems  E.g., command and control, many critical infrastructure systems  require dynamic adaptation in ways not envisioned during development. Enables systems to Operate Through Attacks

RAPIDware Approach Adaptive middleware must support  Multiple dimensions of adaptability  Autonomous execution of middleware components  Dynamic composition of middleware services “Principled” methods  Automated software development (e.g., code generation)  Formal methods support for composition and adaptation Needed for reliability, correctness, security We focus on mobile computing systems  Problem is “harder” than in wired systems  Expected to dominate Internet access

Mobile Computing Testbed Multiple-cell wireless LAN Various laptop, handheld, and wearable computers

Isolating Adaptive Functionality APPLICATION LAYER observers responders Proxy node (e.g., desktop) Application Host computer (desktop) core middleware components Application Host computer (wearable) Application Host computer (palmtop) data paths MIDDLEWARE LAYER NETWORK LAYER

Adaptive Java Many adaptive middleware approaches involve  computational reflection  ability of a process to reason about (and alter) its behavior We developed Adaptive Java  Extension of Java programming language  Provides language-level support for adaptability Example use: Meta(morphic) sockets that can:  report behavior to intrusion detection system  insert forward error correction for wireless networks  change socket behavior to save power

MetaSocket Configuration Application or Middleware Base Code MetaSocket Layer To Network Adaptive Logic

MetaSocket Structure Application can insert and remove filters that manipulate the data stream Some base-class methods are occluded Socket Send- Socket InsertFilter RemoveFilter GetStatus close send filter with thread and buffer MetaSendSocket

Examples: Error Control and Component Auditing Adaptive Java makes it possible to change components dynamically. Effectively, any component can be made more robust, or more secure at run time. Nature of auditing can be determined after development. On-demand auditing may be especially useful to mobile systems.

Wired Network Wireless Network Trader Notifying event Refraction or transmutation Component Loader Decision Maker (DM) Information Event Mediator DM A B C Informer DM Decision Maker

Experimental Configuration Second source begins transmitting to multicast address during audio conversation Access Point Wireless iPAQ Receivers Audio Stream Legitimate Source... Malicious/errant Source

Adaptive Metasocket Behavior Loss thresholds set to 30% and 10%.

Detection of Second Source Second source starts at packet 349, detected at packet 379. Filter inserted automatically to remove “noise.”

Summary RAPIDware is an ONR-funded project in the CSE Dept. Addresses adaptive middleware to protect critical infrastructures from:  Cyber attacks  Component failures  Dynamic external conditions Particular focus on wireless, collaborative computing systems Adaptive Java  Programming language support for adaptability  Enables dynamic reconfiguration and auditing of components in deployed systems

Ongoing Work Adaptive Java and MetaSockets:  Dynamic auditing of components  Dynamic energy consumption management  Quality of service for wireless networks Higher-level languages for adaptability Middleware/Operating System cooperation for  Security  Energy management Anomaly detection using statistical methods Wireless network protocols (video, audio, data) Security and robustness of peer-to-peer networks

Potential Collaboration We are always looking for new research collaborators Security/robustness of mobile computing systems  Emergency services  Command and control  Medical applications Intrusion/anomaly detection and monitoring Control of:  Telecommunication networks  Water distribution systems  Power grids  Business/financial systems “Smart” physical infrastructures: buildings, bridges, dams, etc. Traceability of software development and usage for  Computer forensics?  Tracking intruders Cognitive/Decision-making processes

Related Papers P. McKinley, U. Padmanabhan, N. Ancha, “Experiments in composing proxy audio services for mobile users,” Proc. ACM/IFIP International Conference on Distributed Systems Platforms (Middleware’01), Heidelberg, Germany, Nov P. K. McKinley, et al., Realizing multi-dimensional software adaptation,'' in Proceedings of the ACM Workshop on Self-Healing, Adaptive and self- MANaged Systems (SHAMAN), (New York), June E. Kasten, et al., “Separating introspection and intercession to support metamorphic distributed systems,” Proc. IEEE Workshop on Aspect- Oriented Programming for Distributed Computing Systems (AOPDCS’02), Vienna, Austria, July P. K. McKinley, S. Sadjadi, E. P. Kasten, and R. Kalaskar, “Programming language support for adaptable wearable computing,‘” in Proceedings of the Sixth International Symposium on Wearable Computers, Seattle, Washington, October Z. Yang, et al., “An aspect-oriented approach to dynamic adaptation,” in Proceedings of the ACM SIGSOFT Workshop on Self-Healing Systems (WOSS02) (Charleston, South Carolina), November 2002.

Acknowledgements U.S. Department of the Navy, Office of Naval Research, Grant No. N U.S. National Science Foundation grants: CDA , NCR , CCR , EIA , and EIA This work was supported in part by:

Further Information Software Engineering and Network Systems Lab: RAPIDware Project: contact: