Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University +44 1524 510331 Prof. James P. Sterbenz The.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Report from the Networking in Times of Disaster. What is a Disaster? Networks that work in times of disaster should address: Events that affect a network.
Hong Zhu School of Technology Safety Technology Brookes Interdisciplinary Research Theme.
AMUSE Autonomic Management of Ubiquitous Systems for e-Health Prof. J. Sventek University of Glasgow In collaboration.
Technology Drivers Traditional HPC application drivers – OS noise, resource monitoring and management, memory footprint – Complexity of resources to be.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Self-Managing Anycast Routing for DNS
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Welcome to DEAS 2005 Design and Evolution of Autonomic Application Software David Garlan, CMU Marin Litoiu, IBM CAS Hausi A. Müller, UVic John Mylopoulos,
Dr. Warren K. Vaneman Department of Systems Engineering Naval Postgraduate School Monterey, CA Dr. Kostas Triantis Grado Department of.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Towards Resilient Networks using Programmable Networking Technologies Linlin Xie, Paul Smith, Mark Banfield, Helmut Leopold, James Sterbenz and David Hutchison.
Chapter 1 – Introduction
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Sterbenz, et al. ITTC Cross-Layering and Metrics ResiliNets and ResumeNet 07 October 2009 James P.G. Sterbenz* † Джеймс Ф.Г. Стербэнз 제임스 스털벤츠 司徒傑莫 David.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Network Enabled Capability Through Innovative Systems Engineering Service Oriented Integration of Systems for Military Capability Duncan Russell, Nik Looker,
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Frequently asked questions about software engineering
UNCLASSIFIED Strategies for leading crisis command across organisations for greater interoperability Superintendant Michael Chew AFP ACTP – Counter Terrorism.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Introduction to Network Defense
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 IS 8950 Managing Network Infrastructure and Operations.
IA&S July 17, Fault Tolerant Networks (FTN) Research Program Joint Information Assurance & Survivability (IA&S) Principal Investigator Meeting Honolulu,
THE CHALLENGE OF ORGANIZATIONAL COMMUNICATION
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
WELCOME. AUTONOMIC COMPUTING PRESENTED BY: NIKHIL P S7 IT ROLL NO: 33.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
A Framework for Network Resilience David Hutchison Lancaster University
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Fostering a ‘Whole Community’ Approach to Emergency Management David J. Kaufman Director, Office of Policy and Program Analysis 8 June 2011.
Association of Defense Communities June 23, 2015
The Art of Networking Competences for Networking in European Education Cultural Diversity in Networks: Opportunities and Challenges.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Leonardo Flores Añover Ramón.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University Prof. James P. Sterbenz The University of.
Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Cyber security: Lithuanian National Regulatory Authority expertise in monitoring national networks resilience Dr. Rytis Rainys | rrt.lt at TAIEX Multi-beneficiary.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
In the name of God.
Understanding Transportation Resilience: A Roadmap
The Agility Imperative: Agile C2 for Complex Endeavors
An Urgent National Imperative
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
An Original Model of Infrastructure System Resilience
Sensor Network-Centric Security
Presentation transcript:

Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University Prof. James P. Sterbenz The University of Kansas, Lancaster University Members Chris Edwards Laurent Mathy Andreas Mauthe Andrew Scott David Andrews Weichao Wang Alex Wyglinski Marcus Schöller Paul Smith Manolis Sifalakis Linlin Xie Egemen Cetenkaya Daniel Fokum Abdul Jabbar Justin Rohrer Piyush Upadhyay Related Projects ANA Postmodern TA ResiliNets — Multilevel Resilient and Survivable Networking Initiative InfoLab21 Motivation Society increasingly relies on computer networks in general and the Internet in particular. Consumers rely on networks for access to information and services, personal finance, and for communication with others. The Internet has become indispensable to the routine operation of businesses and to the global economy. The military depends on network centric operations and warfare. Governments depend on networks for their daily operation, service delivery, and response to natural disaster and terrorist attacks. Therefore, we regard resilience and survivability as critical to the future of our network infrastructure. Resilience is the ability of the network to provide and maintain an acceptable level of service in the face of various challenges to normal operation. We aim to engineer a system to protect itself from these challenges and to recognize the impact autonomously if the defence could not isolate the effects. In this case the system services must self-organize themselves to remain accessible whenever possible and degrade gracefully when necessary. As soon as the challenge ended the system must automatically and rapidly recover from degradation to normal operation. To improve future operation of a resilient system, it has to learn from past incidents and refine its operational and defensive mechanism.

ResililNets StrategyResiliNets PrinciplesResiliNets Architecture Principles Service Requirements: need for resilience Normal Behaviour must be specified Threat and Challenge Models Metrics to measure and engineer resilience Resource Tradeoffs determine deployment Complexity understood and reduced Multilevel: layer, plane, network architecture Translucency: abstraction vs. interlevel visibility Trust and Policy relationship Redundancy in space and time Diversity: space, time, medium, and mechanism Self-Organising and Autonomic behaviour Security and Self-Protection State Management alternatives Connectivity and Association Context Awareness Adaptability to the network environment Evolvability to refine future behaviour Axioms: IUER Inevitability of Faults Understand Normal Operations Expect Adverse Events and Conditions Respond to the Adverse Events and Conditions Strategy: D 2 R 2 + DR Phase 1: Real-Time Control Loop – D 2 R 2 Defend challenges and threats to normal operation Detect when adverse event or condition has occurred Remediate effects to minimise the impact Recover to original and normal operations Phase 2: Background – DR Diagnose the fault that was the root cause Refine behaviour for the future D2R2 cycles Multilevel Protocol layer: Functionally composed with cross-layer controls Protocol plane: data, control, management Network architecture and engineering: network elements through topology to global net candidates for other stuff: mechanisms programmable autonomic node realms (compartments) modelling: net ops and service space…