1 RSRS Architecture Study Calton Pu and Doug Blough CERCS/Georgia Tech.

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

Data mining in wireless sensor networks based on artificial neural-networks algorithms Authors: Andrea Kulakov and Danco Davcev Presentation by: Niyati.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Design of an Autonomous Anti-DDOS Network (A2D2) Angela Cearns Thesis Proposal Master of Software Engineering University of Colorado, Colorado Springs.
1 Advanced Digital Design Asynchronous Design: Research Concept by A. Steininger and M. Delvai Vienna University of Technology.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 8: Autonomic computing.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Department of Electrical and Computer Engineering Kekai Hu, Harikrishnan Chandrikakutty, Deepak Unnikrishnan, Tilman Wolf, and Russell Tessier Department.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
Quality Management ISO 9001 For TM. What is Quality Quality is the degree to which product or service possesses a desired combination of attributes C:
1 Approved for Public Release, Distribution Unlimited Lee Badger Information Processing Technology Office Defense Advanced Research Projects Agency Self-Regenerative.
Real-Time Scheduling for WirelessHART Networks by Abusayeed Saifullah, You Xu, Chenyang Lu, and Yixin Chen A Presentation of Findings for CSE5095 Joshua.
Presentation By Anil Kumar Marikukala, Syed Khaja Najmuddin Ahmed.
1 Autonomic Computing An Introduction Guenter Kickinger.
Chapter 2 The process Process, Methods, and Tools
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
Security Architecture
Honeypot and Intrusion Detection System
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
DARPA SRS PI MTG 13 JULY 2005 SRS Program Red Teaming Sandia National Labs John Clem Program Manager IDART™
NEST 1 NEST System Working Group Meeting #1 Jack Stankovic University of Virginia September 2001 Boeing Huntington Beach, CA.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
RSRS Architecture Study Doug Blough and Calton Pu CERCS/Georgia Tech.
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Self-Regenerative Systems (SRS) PI Meeting Alexandria, Virginia December 14-15, 2005.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Automated Control in Cloud Computing: Challenges and Opportunities Harold C. Lim, Shivnath Babu, Jeffrey S. Chase, and Sujay S. Parekh ACM’s First Workshop.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 18 Months - Activity Demonstrations Patents/Patent Applications: Experiments: Publications: Red Team Engagements: Red Teams Sandia RABA Cigital White.
1 IA&S IA&S Roadmap and ITS Direction Dr. Jay Lala ITS Program Manager 23 February, 2000.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Network security Product Group 2 McAfee Network Security Platform.
MILAN: Technical Overview October 2, 2002 Akos Ledeczi MILAN Workshop Institute for Software Integrated.
MAPLD 2005/254C. Papachristou 1 Reconfigurable and Evolvable Hardware Fabric Chris Papachristou, Frank Wolff Robert Ewing Electrical Engineering & Computer.
Randomized Failover Intrusion- Tolerant Systems (RFITS) Ranga Ramanujan, Maher Kaddoura, Carla Marceau, Clint Sanders, Doug Harper, David Baca Architecture.
Repurpose, Compose, Profit— Next Generation SOA Infrastructure William Cox Cox Software Architects LLC Copyright 2008.
Applications & Systems Development A very brief overview of the SDLC and the security issues involved.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
SRS Architecture Study Partha Pal Franklin Webber.
1 Lee Badger Information Processing Technology Office Defense Advanced Research Projects Agency Self-Regenerative Systems PM Welcome Dec. 14, 2005.
SRS Common Architecture Bob Balzer Neil Goldman Dave Wile Teknowledge Corp.
Cryptography and Network Security Sixth Edition by William Stallings.
1 Earth Science Technology Office The Earth Science (ES) Vision: An intelligent Web of Sensors IGARSS 2002 Paper 02_06_08:20 Eduardo Torres-Martinez –
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Ch7: Software Production Process. 1 Waterfall models  Invented in the late 1950s for large air defense systems, popularized in the 1970s  Main characteristics:
Model Integrated Computing and Autonomous Negotiating Teams for Autonomic Logistics G.Karsai (ISIS) J. Doyle (MIT) G. Bloor (Boeing)
SRS Architecture Study Partha Pal Franklin Webber.
WIRELESS INTEGRATED NETWORK SENSORS
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Approved for public release; distribution is unlimited. 10/7/09 Autonomous Systems Sensors – The Front End of ISR Mr. Patrick M. Sullivan SPAWAR ISR/IO.
Wagner Associates NCSD-ADS-DOC ARO Workshop on Cyber Situation Awareness RPD-inspired Hypothesis Reasoning for Cyber Situation Awareness.
Sensor Coordination using Active Dataspaces Steven Cheung NSF NOSS PI Meeting October 18, 2004.
Intrusion Tolerant Distributed Object Systems Joint IA&S PI Meeting Honolulu, HI July 17-21, 2000 Gregg Tally
Database Design, Application Development, and Administration, 6 th Edition Copyright © 2015 by Michael V. Mannino. All rights reserved. Chapter 5 Understanding.
1 Automating Network Diagnostics to Help End-Users Dave Thaler
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Detection and Analysis of Threats to the Energy Sector (DATES)
Presentation transcript:

1 RSRS Architecture Study Calton Pu and Doug Blough CERCS/Georgia Tech

2 RSRS Study Outline Model of self-regenerative systems Analysis and meta-model based on feedback/reflection: (MLA) loop Comparison of SRS projects (by area) Event-based core functional interfaces Self-regenerative (MLA) functionality Area-specific functionality Project-specific capabilities Synthesis and integration of interfaces

3 Self-Regeneration Meta-Model Focus on self-regeneration process Based on feedback and reflection Monitor-Learning-Actuator (MLA) loop MLA loop appears in several system levels Monitor Learning Actuator

4 Model of Biologically-Inspired Diversity Biologically-Inspired Diversity Tools (Genesis, Dawson) Cognitive Immunity and Self-Healing GSR

5 Biologically-Inspired Diversity Tools Cognitive Immunity and Self-Healing (Learn/Repair, Model-Based, AWDRAT, Cortex) Reasoning About Insider Threats Applications Granular, Scalable Redundancy Attacks Monitor Learning Actuator BID Model of Cognitive Immunity and Self-Healing GSR

6 Sensors & Sources Model of Granular, Scalable Redundancy Biologically-Inspired Diversity Tools Reasoning About Insider Threats Applications Cognitive Immunity and Self-Healing GSR Sensors & Sources Event Proc. (QuickSilver) Granular, Scalable Redundancy Object Mgmt (SAIIA, IITSR) GSR GSR Communications (QuickSilver)

7 Model of Reasoning About Insider Threats Reasoning About Insider Threats (Detect & Prevent, Mitigate, Asbestos) Cognitive Immunity and Self-Healing GSR

8 Biologically-Inspired Diversity Tool (Genesis, Dawson) Cognitive Immunity and Self-Healing Fabric (Learn/Repair, Model-Based, AWDRAT, Cortex) Reasoning About Insider Threats (Detect & Prevent, Mitigate) Applications Granular, Scalable, Redundancy (SAIIA, IITSR, QuickSilver) Attacks Monitor Learning Actuator GSR RSRS Model Summary

9 Core Functional Interface Comparison by Area Core functionality for each area Self-regenerative (MLA) functionality Cognitive immunity and self-healing Reasoning about insider threats Area-specific functionality Biologically-inspired diversity Granular, scalable redundancy Project-specific capabilities

10 Biologically-Inspired Diversity Interfaces Self-regeneration (MLA) functionality Test and evaluation environment Area-specific functionality Create diverse representations of programs in response to known and unknown attacks Provide a “measure” of diversity (estimated degree of resistance to known attacks) Project-specific functionality

11 Cognitive Immunity and Self- Healing Interfaces Self-regeneration (MLA) functionality Monitor interface: evaluate the defensive actions during attacks on applications Learning interface: match attacks and defenses (diverse code generation tools) Regeneration Actuator interface: replace vulnerable code Area-specific functionality Project-specific functionality Learn/Repair: embedded data structure repair tools

12 Granular, Scalable Redundancy Interfaces Self-regeneration (MLA) functionality Regeneration in multicast, gossip protocols Area-specific functionality Redundant communication services (pub/sub, multicast) Redundant event processing Redundant object management services Project-specific functionality

13 Reasoning About Insider Threats Interfaces Self-regeneration (MLA) functionality Monitor interface: detect potential/actual insider threats Learning interface: refine detection and guide adaptive responses Regeneration Actuator interface: implement adaptive policies in response Area-specific functionality Project-specific functionality

14 We Need Your Help Give comments and feedback on the model and core functional interfaces If it doesn’t fit your project well Provide concrete information on the functional interfaces of your project Core: Self-regeneration (MLA) interface and area-specific interface Project-specific interfaces