136 research outputs found

    Survivability analogy for cloud computing

    Get PDF
    As cloud computing has become the most popular computing platform, and cloud-based applications a commonplace, the methods and mechanisms used to ensure their survivability is increasingly becoming paramount. One of the prevalent trends in recent times is a turn to nature for inspiration in developing and supporting highly survivable environments. This paper aims to address the problems of survivability in cloud environments through inspiration from nature. In particular, the community metaphor in nature's predator-prey systems where autonomous individuals' local decisions focus on ensuring the global survival of the community. Thus, we develop analogies for survivability in cloud computing based on a range of mechanisms which we view as key determinants of prey's survival against predation. For this purpose we investigate some predator-prey systems that will form the basis for our analogical designs. Furthermore, due to a lack of a standardized definition of survivability, we propose a unified definition for survivability, which emphasizes as imperative, a high level of proactiveness to thwart black swan events, as well as high capacity to respond to insecurity in a timely and appropriate manner, inspired by prey's avoidance and anti-predation approaches. © 2017 IEEE

    A tale of three systems : case studies on the application of architectural tactics for cyber-foraging

    Get PDF
    Cyber-foraging is a technique to enable mobile devices to extend their computing power and storage by offloading computation or data to more powerful servers located in the cloud or in single-hop proximity. In previous work, we developed a set of reusable architectural tactics for cyber-foraging systems. We define architectural tactics as design decisions that influence the achievement of a system quality. In this article we present the results of three case studies to validate the application of the tactics to promote their intended functional and non-functional requirements. The first two case studies focus on the identification of architectural tactics in existing cyber-foraging systems. The third case study focuses on the development of a new cyber-foraging system using the architectural tactics. The results of the case studies are an initial demonstration of the validity of the tactics, and the potential for taking a tactics-driven approach to fulfill functional and non-functional requirements for cyber-foraging systems. (C) 2019 Elsevier B.V. All rights reserved

    Nature-inspired survivability: Prey-inspired survivability countermeasures for cloud computing security challenges

    Get PDF
    As cloud computing environments become complex, adversaries have become highly sophisticated and unpredictable. Moreover, they can easily increase attack power and persist longer before detection. Uncertain malicious actions, latent risks, Unobserved or Unobservable risks (UUURs) characterise this new threat domain. This thesis proposes prey-inspired survivability to address unpredictable security challenges borne out of UUURs. While survivability is a well-addressed phenomenon in non-extinct prey animals, applying prey survivability to cloud computing directly is challenging due to contradicting end goals. How to manage evolving survivability goals and requirements under contradicting environmental conditions adds to the challenges. To address these challenges, this thesis proposes a holistic taxonomy which integrate multiple and disparate perspectives of cloud security challenges. In addition, it proposes the TRIZ (Teorija Rezbenija Izobretatelskib Zadach) to derive prey-inspired solutions through resolving contradiction. First, it develops a 3-step process to facilitate interdomain transfer of concepts from nature to cloud. Moreover, TRIZ’s generic approach suggests specific solutions for cloud computing survivability. Then, the thesis presents the conceptual prey-inspired cloud computing survivability framework (Pi-CCSF), built upon TRIZ derived solutions. The framework run-time is pushed to the user-space to support evolving survivability design goals. Furthermore, a target-based decision-making technique (TBDM) is proposed to manage survivability decisions. To evaluate the prey-inspired survivability concept, Pi-CCSF simulator is developed and implemented. Evaluation results shows that escalating survivability actions improve the vitality of vulnerable and compromised virtual machines (VMs) by 5% and dramatically improve their overall survivability. Hypothesis testing conclusively supports the hypothesis that the escalation mechanisms can be applied to enhance the survivability of cloud computing systems. Numeric analysis of TBDM shows that by considering survivability preferences and attitudes (these directly impacts survivability actions), the TBDM method brings unpredictable survivability information closer to decision processes. This enables efficient execution of variable escalating survivability actions, which enables the Pi-CCSF’s decision system (DS) to focus upon decisions that achieve survivability outcomes under unpredictability imposed by UUUR

    NSF CAREER: Scalable Learning and Adaptation with Intelligent Techniques and Neural Networks for Reconfiguration and Survivability of Complex Systems

    Get PDF
    The NSF CAREER program is a premier program that emphasizes the importance the foundation places on the early development of academic careers solely dedicated to stimulating the discovery process in which the excitement of research enriched by inspired teaching and enthusiastic learning. This paper describes the research and education experiences gained by the principal investigator and his research collaborators and students as a result of a NSF CAREER proposal been awarded by the power, control and adaptive networks (PCAN) program of the electrical, communications and cyber systems division, effective June 1, 2004. In addition, suggestions on writing a winning NSF CAREER proposal are presented

    Implementation of Cognitive Mapping Algorithm for Robot Navigation System

    Get PDF
    Abstract—Mobile robot is a construction of robot that is equipped with wheel to move around its environment in finishing its specific task. Robot will be given some algorithm for certain task. In this project, we are going to build the cognitive mapping algorithm that can be implemented to the mobile robot. This mobile robot will be given some inputs which are horizontal and vertical value and start and goal point and a task which is to move from start point to goal point. Some obstacles are also located in the arena and the mobile robot must be able to avoid any given obstacles to reach the goal point. After doing all implementation, finally, some comparison between robot mapping and robot edge follower will be done to observe the differences between these algorithms in term of time and path needed

    UK perspective research landscape for offshore renewable energy and its role in delivering net zero

    Get PDF
    Acknowledgements This work was conducted within the Supergen Offshore Renewable Energy (ORE) Hub, a £9 Million programme 2018–2023 funded by Engineering and Physical Sciences Research Council (EPSRC) under grant no. EP/S000747/1.Peer reviewedPublisher PD

    Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

    Get PDF
    This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first, attack projection and intention recognition, in which there is a need to predict the next move or the intentions of the attacker, intrusion prediction, in which there is a need to predict upcoming cyber attacks, and network security situation forecasting, in which we project cybersecurity situation in the whole network. Methods and approaches for addressing these tasks often share the theoretical background and are often complementary. In this survey, both methods based on discrete models, such as attack graphs, Bayesian networks, and Markov models, and continuous models, such as time series and grey models, are surveyed, compared, and contrasted. We further discuss machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security. The survey also focuses on the practical usability of the methods and problems related to their evaluation

    Expeditionary Energy in the Arctic Domain: The Impacts of Emerging Technology and Interoperability on Energy Requirements in the High North Environment

    Get PDF
    The primary objective of this paper is to explore the current status of electrical energy generation in the Arctic environment and identify possible materiel or interoperability solutions to increase the electrical energy self-sufficiency of tactical-size military units conducting distributed operations in the Norwegian High North. This exploration is undertaken by establishing a knowledge baseline of the Norwegian High North's political, geographical, military, and social considerations. Next, a model of explanation will be introduced using the NATO DOTMILPF-I framework to examine the problem statement. This is followed by examining current Marine Corps electrical energy generation solutions using recent training and exploring emerging technologies that could be used to increase tactical-size unit electrical energy self-sufficiency. The emerging technologies will focus primarily on using hydrogen as an energy carrier; however, other applications will also be considered. The research method and design will be supported by a focused literature review from Marine Corps expeditionary energy solutions sources and content analysis of existing data related to Marine Corps training in Northern Norway from 2018 – April 2023. These methods are augmented by my first-hand observations experienced during this period while supporting Marine Corps training in Norway from 2017 to the present. The Marine Corps emerging doctrinal concepts summarized and linked to the problem statement include A Concept for Stand-in Forces, A Functional Concept for Maritime Reconnaissance and Counter-reconnaissance, and Expeditionary Advance Base Operations. The empirical analysis will be focused by using the NATO DOTMILPF-I framework with the training, materiel, and interoperability elements selected as the most applicable for exploring this problem statement. Existing interoperability relationships will be explored to identify current relationships and future partnership opportunities between units or research organizations. Finally, key findings will be discussed and recommendations given on addressing this thesis's problem statement. In summary, this paper will provide an understanding of the current Arctic environment and military considerations related to military operations in the Norwegian High North, connect the emerging Marine Corps doctrinal concepts with electrical energy self-sufficiency considerations, and link these considerations to future interoperability between the Norwegian Armed Forces and the United States Marine Corps. Lastly, while the scope of this problem statement will be limited to the Norwegian High North, electrical energy self-sufficiency considerations have the potential for global Marine Corps utilization
    corecore