1,461 research outputs found

    Command-and-control (C2) theory : a challenge to control science

    Get PDF
    by Michael Athans

    A Holistic Approach to Service Survivability

    Get PDF
    We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion. Contrary to the ad hoc manner in which contemporary survivable systems are built--using isolated, independent security mechanisms such as firewalls, intrusion detection systems and software sandboxes--SABER integrates several different technologies in an attempt to provide a unified framework for responding to the wide range of attacks malicious insiders and outsiders can launch. This coordinated multi-layer approach will be capable of defending against attacks targeted at various levels of the network stack, such as congestion-based DoS attacks, software-based DoS or code-injection attacks, and others. Our fundamental insight is that while multiple lines of defense are useful, most conventional, uncoordinated approaches fail to exploit the full range of available responses to incidents. By coordinating the response, the ability to survive even in the face of successful security breaches increases substantially. We discuss the key components of SABER, how they will be integrated together, and how we can leverage on the promising results of the individual components to improve survivability in a variety of coordinated attack scenarios. SABER is currently in the prototyping stages, with several interesting open research topics

    Resilient network design: Challenges and future directions

    Get PDF
    This paper highlights the complexity and challenges of providing reliable services in the evolving communications infrastructure. The hurdles in providing end-to-end availability guarantees are discussed and research problems identified. Avenues for overcoming some of the challenges examined are presented. This includes the use of a highly available network spine embedded in a physical network together with efficient crosslayer mapping to offer survivability and differentiation of traffic into classes of resilience. © 2013 Springer Science+Business Media New York
    corecore