Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,

Slides:



Advertisements
Similar presentations
AMUSE Autonomic Management of Ubiquitous Systems for e-Health Prof. J. Sventek University of Glasgow In collaboration.
Advertisements

Department of Electronic Engineering Challenges & Proposals INFSO Information Day Research Networking Test-beds 26/27 May 2005,
System’s generalities and structure of the final report Cesidio Bianchi. INGV.
Self-Managing Anycast Routing for DNS
Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
IRRIIS – Integrated Risk Reduction of Information-based Infrastructure Systems Workshop - Middleware Improved Technology for Interdependent Critical Infrastructures.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Boost your network security with NETASQ Vulnerability Manager.
Improving Software Quality with Generic Autonomics Support Richard Anthony The University of Greenwich.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
Adaptive Infrastructures EPRI/DoD Initiative on Complex Interactive Networks/Systems Joint innovative research ·EPRI and ·Office of the Director of Defense.
Information Survivability Control Systems Earl Crane Security Architecture and Analysis Thursday, September 07, 2000.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Managing the Information Technology Resource Course Introduction.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
MIT Requirements for TLC IRRIIS MIT Conference ROME 8 February 2007 Giustino FUMAGALLI Arnaud ANSIAUX.
May 2005 Towards a network of digital ecosystems: which technology,which research ? Workshop: Review of the technology and research activity Context and.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
1st IRRIIS Workshop, April 26th, 2006 Key challenges for Critical Information Infrastructure Protection 1st IRRIIS Workshop Sankt Augustin April 26th,
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
1 Autonomic Computing An Introduction Guenter Kickinger.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
I T & S A e r o s p a c eD e f e n c e Content adaptation for gradual Quality of Service Vania Conan, Arnaud Pierre Thales
Global test beds for control, safety, security and dependability in ICT-Enabled Critical Infrastructures From SAFEGUARD Intrusion Detection Test Environment.
La Modellazione delle Reti Complesse: il Grand Canyon tra Ricerca e Realtà Sandro Bologna ENEA – CAMO CR Casaccia, Roma
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Automating service management Tiina Niklander Faculty of Science Department of Computer Science In AMICT 2008 Petrozavodsk, May 2008.
Dart: A Meta-Level Object-Oriented Framework for Task-Specific Behavior Modeling by Domain Experts R. Razavi et al..OOPSLA Workshop DSML‘ Dart:
The Grid Component Model: an Overview “Proposal for a Grid Component Model” DPM02 “Basic Features of the Grid Component Model (assessed)” -- DPM04 CoreGrid.
Managerial Intelligent Node for Decisional Emergency Support Energy Department Strategic Project Balducelli Claudio Bologna Sandro Gadomski Adam M. More.
Sandro Bologna - ENEA Claudio Balducelli – YLICHRON (ENEA) Massimo Gallanti - CESI Ricerca Workshop – AICT Roma 6 Dicembre, 2007 ICT nella gestione del.
Introduction to IRRIIS MIT Add-On Components IRRIIS, CRUTIAL & GRID Review Meeting 15 March 2007, Brussels Sandro Bologna.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
From Objects to Assets: The Fungibility of Knowledge Christopher W. Higgins, Esq.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
One or More Topologies ? One or More Topologies ? A methodological reflection IRRIIS Project, WP2.1 “Topology Analysis” Rome Meeting, 6,7 April 2006 IST.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Dynamic and Selective Combination of Extension in Component-based Applications Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo N. Jørgensen.
Introduction to the IRRIIS Simulation SimCIP Césaire Beyel.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University Prof. James P. Sterbenz The.
Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano.
MIT Communication & Risk Management Language Workshop - Middleware Improved Technology for Interdependent Critical Infrastructures 8 February 2007, Rome.
PnP Networks Self-Aware Networks Self-Aware Networks Self-Healing and Self-Defense via Aware and Vigilant Networks PnP Networks, Inc. August, 2002.
Tolerating Intrusions Through Secure System Reconfiguration Dennis Heimbigner and Alexander Wolf University of Colorado at Boulder John Knight University.
DEFINE central topics: Critical infrastructures interdependencies Marcelo Masera Joint Research Centre DEFINE workshop November 2002, Pisa.
November 2004 Global Forum Shaping the future The Broad Convergence Session 6: IS Perspectives for Communities Digital Business Ecosystems: A New.
DEPENDABILITY ANALYSIS (towards Networked Information Systems) Ester Ciancamerla, Michele Minichino ENEA {ciancamerlae, In.
Survivability Architectures : Issues and Approaches Presented by Erion Lin Department of Information Management, National Taiwan University.
CS223: Software Engineering Lecture 32: Software Maintenance.
` Question: How do immune systems achieve such remarkable scalability? Approach: Simulate lymphoid compartments, fixed circulatory networks, cytokine communication.
The project An architecture for Safeguarding large complex critical infrastructures Start slide show.
Network Life Cycle Created by Michael Law
Instantiation of the Concept in GAMMA Prototypes
For modeling conflict and cooperation Schwartz/Teneketzis
Mobile Agents.
CORE Security Technologies
3rd Studierstube Workshop TU Wien
Managerial Intelligent Node for Decisional Emergency Support
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa, November 2002 Sandro Bologna, ENEA

Safeguard Project Presentation - November 2002 Pisa An overview of the SAFEGUARD Project Aims to enhance the survivability of Large Complex Critical Infrastructures (LCCIs) developing a middleware that implement the concepts of Self-healing Architectures. It will use electricity networks and telecommunications networks as practical examples of LCCIs. The aim is to produce a generic solution that can be adapted for other forms of LCCI. Started December 2001, ends May 2004

Safeguard Project Presentation - November 2002 Pisa Assumptions in the SAFEGUARD Project Safeguard is based on the assumptions that: Large Complex Critical Infrastructures are too complex to be protected solely by the existing generic SCADA Systems based on “conventional” technology LCCIs does not evolve dynamically Agent technology is a very effective way to implement the concepts of Self-healing Architectures and increase the survivability of LCCIs faced with: Failure Accidents Attacks

Safeguard Project Presentation - November 2002 Pisa ‚ - human organisation node - physical network node - control & information flows network node - SAFEGUARD network node ‚ ‚ ‚ ‚ ‚ ‚ ‚

Safeguard Project Presentation - November 2002 Pisa Protection agents Self-healing agents Control agents Vulnerability Assessment agents Reconfiguration agents Event Identification agents Planning agents Fault Isolation agents STRATEGIC LAYER PLANNING LAYER REACTIVE CONTROL LAYER PROPRIETARY CONTROL SYSTEM

Safeguard Project Presentation - November 2002 Pisa VIRUS CHECKER IDS DIAGNOSIS SOFTWARE ANOMALY DETECTION Increase sensitivity Add diagnosis Add virus definition Add attack signature Wrapper agent Action agent Correlation agent High-level agent at the top of the anomaly detecting hierarchy Topology Agent Negotiation agent STATE ESTIMATOR Ignore data Roles and interrelations between SAFEGUARD agents

Safeguard Project Presentation - November 2002 Pisa CyberLayer OrganisationalLayer Intra-dependency Inter-dependency WHY CONTEXT DEPENDENT ADAPTIVE AGENTS PhysicalLayer Structural Complexity Network Evolution Node Diversity Connection Diversity Dynamical complexity System misuse

Safeguard Project Presentation - November 2002 Pisa NEW R&D SUBJECTS SELF-HEALING ARCHITECTURES BASED ON CONTEXT DEPENDENT ADAPTIVE SOFTWARE AGENTS (SADESA) TO DEVELOP APPROPRIATE ARCHITECTURES DEPLOYING ON LINE CONTEXT-DEPENDENT NETWORK AGENTS THAT ADAPT TO EVENTS AND SURRONDINGS, ACTING BOTH COMPETITIVELY AND COOPERATIVELY FOR THE GOOD OF THE ENTIRE SYSTEM

Safeguard Project Presentation - November 2002 Pisa SADESA