MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne.

Slides:



Advertisements
Similar presentations
An Overview of ABFT in cloud computing
Advertisements

1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC.
Chapter 19: Network Management Business Data Communications, 5e.
DARPA ITS PI Meeting – Honolulu – July 17-21, 2000Slide 1 Aegis Research Corporation Intrusion Tolerance Using Masking, Redundancy and Dispersion DARPA.
PROVIDING ROBUST AND UBIQUITOUS SECURITY SUPPORT FOR MOBILE AD- HOC NETWORKS Georgios Georgiadis 6/5/2008.
Survivability of Mobile Code Land Warfare Requirements for IMPACT Agent Systems IMPACT Symposium -12 August 1999 University of Maryland at College Park.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Presented By: Vinay Kumar.  At the time of invention, Internet was just accessible to a small group of pioneers who wanted to make the network work.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
MAFTIA concepts Yves Deswarte & David Powell LAAS-CNRS, France SRI International.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
FMEA-technique of Web Services Analysis and Dependability Ensuring Anatoliy Gorbenko Vyacheslav Kharchenko Olga Tarasyuk National Aerospace University.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Reliability Andy Jensen Sandy Cabadas.  Understanding Reliability and its issues can help one solve them in relatable areas of computing Thesis.
25 November 2002 DeSIRE, Pisa Methods and Tools for Formal Design and Validation Michael Butler University of Southampton
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo
Dependable ICT for Utilities Proposal for DESIRE activities The CRIS Institute Hans Ottosson The International.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Copyright John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Fault Tolerance David Powell LAAS-CNRS, Toulouse.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Cryptography and Network Security (CS435) Part One (Introduction)
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
An Adaptive Intrusion-Tolerant Architecture Alfonso Valdes, Tomas Uribe, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Josh Levy, Hassen.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Safety-Critical Systems 7 Summary T V - Lifecycle model System Acceptance System Integration & Test Module Integration & Test Requirements Analysis.
High-integrity Sensor Networks Mani Srivastava UCLA.
WP2001 CPA4 Towards Dependable and Survivable Systems and Infrastructures Baton holder ANDREA SERVIDA European Commission DG Information Society C-4
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Fault Tolerance and Security Geraint Price Information Security Group Royal Holloway.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
MAFTIA’s Interpretation of the IFIP 10.4 Terminology Yves Deswarte LAAS-CNRS Toulouse, France David Powell.
1 INTRUSION TOLERANT SYSTEMS WORKSHOP Phoenix, AZ 4 August 1999 Jaynarayan H. Lala ITS Program Manager.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
Middleware for Fault Tolerant Applications Lihua Xu and Sheng Liu Jun, 05, 2003.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair.
On Hierarchical Design of Computer Systems for Critical Applications Peter Gabriel Neumann Presented by Bo Cui.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Initiatives for FP6 A few thoughts on flip chart about: Open Infrastructures Paulo E. Veríssimo LaSIGe-FCUL, Univ. Lisboa
Problem On a regular basis we use: –Java applets –JavaScript –ActiveX –Shockwave Notion of ubiquitous computing.
Testing Overview Software Reliability Techniques Testing Concepts CEN 4010 Class 24 – 11/17.
In the name of God.
Software Dependability
Intrusion Tolerant Architectures
Outline Basic concepts in computer security
WP3: D3.1 status, pending comments and next steps
Evaluation Forms for Blockchain- Based System ver. 1.0
An assessment framework for Intrusion Prevention System (IPS)
Mehrdad Moradi Oct. 22, 2018 MSDL Research day
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne

Project members Robert Stroud, Peter Ryan, University of Newcastle upon Tyne David Powell, Yves Deswarte, CNRS-LAAS Paulo Veríssimo, Nuno Neves, University of Lisboa Andreas Wespi, Christian Cachin, IBM Research, Zurich Sadie Creese, Qinetiq Andre Adelsbach, Christian Stüble, University of Saarland

Added value MAFTIA has been described as “uniquely synergistic” The consortium brings together experts from many different communities: fault-tolerance, distributed computing, computer security, intrusion detection and cryptography Each community has its own terminology and this is sometimes a source of confusion: Attack vs intrusion Trusted vs trustworthy Dependability concepts can be used to clarify these issues

Project Objectives The goal of MAFTIA was to investigate the ‘tolerance’ paradigm for security systematically Work has focused in three main areas: the architecture of MAFTIA: providing a framework that ensures the dependability of distributed applications in the face of a wide class of faults and attacks, the design of mechanisms and protocols: providing the required building blocks to implement large scale dependable applications, the formal assessment of our work: rigorously defining the basic concepts developed by MAFTIA and verifying the results of the work on dependable middleware. MAFTIA has made significant progress in each of these areas, and is seen to be a leader in the field of intrusion tolerance by DARPA projects working in the same area

MAFTIA contributions to DESIRE Trusted System Components How to construct trustworthy system building blocks with carefully defined failure modes Intrusion Tolerant Protocols and Services Use of hybrid failure models, extending and generalising existing MAFTIA results on group communication Reliable Intrusion Detection Systems Improving the accuracy of existing IDSs, making them intrusion tolerant, use for error detection and recovery Case Studies Industrial applications of MAFTIA’s existing results

MAFTIA contributions to DEFINE Intrusion Tolerance Concepts Trust models and security policies for ubiquitous computing Architectural Frameworks Acceptable availability under attack,dynamic adaptation to environmental changes Application Level Intrusion Detection Lightweight targeted IDS, integration with application level error recovery in a workflow system Intrusion Tolerant Authorisation Schemes Extending MAFTIA’s existing work to deal with mobile hosts and ad hoc networks, integration with transactional workflows Verification and Assessment Tools and techniques to support vulnerability forecasting and vulnerability removal, security cases, attack trees