Computation in the Wild Staphanie Forrest Justin Balthrop Matthew Glickman David Ackley Presented by Montana Low.

Slides:



Advertisements
Similar presentations
Safe System Approach Eric Howard.
Advertisements

Operating System Security
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
SOFTWARE TESTING. INTRODUCTION  Software Testing is the process of executing a program or system with the intent of finding errors.  It involves any.
Select the correct answer from the given choices. The computer will tell you if you are right or wrong. Good Luck!
Architecture For An Artificial Immune System S. A. Hofmeyr and S. Forrest.
Understanding Work Teams
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Bastien DURAND Karen GODARY-DEJEAN – Lionel LAPIERRE Robin PASSAMA – Didier CRESTANI 27 Janvier 2011 ConecsSdf Architecture de contrôle adaptative : une.
Manajemen Basis Data Pertemuan 9 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
1 Minggu 12, Pertemuan 23 Introduction to Distributed DBMS (Chapter , 22.6, 3rd ed.) Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Enterprise Interoperability Basic Concepts and Definitions David Chen IMS-LAPS University Bordeaux 1 FRANCE.
ABCSG - Distributed Database 1 Data Management Distributed Database Data Replication.
Industrial Avionics Working Group 19/04/07 Modular Certification Developing Safety Case Modules.
Prénom Nom Document Analysis: Artificial Neural Networks Prof. Rolf Ingold, University of Fribourg Master course, spring semester 2008.
Overview Distributed vs. decentralized Why distributed databases
Agent-Based Acceptability-Oriented Computing International Symposium on Software Reliability Engineering Fast Abstract by Shana Hyvat.
CS294-6 Reconfigurable Computing Day 16 October 15, 1998 Retiming.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
Before we start ADALINE
Chapter 5. Operations on Multiple R. V.'s 1 Chapter 5. Operations on Multiple Random Variables 0. Introduction 1. Expected Value of a Function of Random.
Supplement 02 (a)Systems Theory1 Supplement 02 (a) Systems Theory And Franchise Colleges By MANSHA NAWAZ.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
IMS 4212: Distributed Databases 1 Dr. Lawrence West, Management Dept., University of Central Florida Distributed Databases Business needs.
Priority Research Direction Key challenges Fault oblivious, Error tolerant software Hybrid and hierarchical based algorithms (eg linear algebra split across.
13.7 – Graphing Linear Inequalities Are the ordered pairs a solution to the problem?
Evaluation of Safety Critical Software -- David L. Parnas, -- A. John van Schouwen, -- Shu Po Kwan -- June 1990 Presented By Zhuojing Li.
Design Patterns OOD. Course topics Design Principles UML –Class Diagrams –Sequence Diagrams Design Patterns C#,.NET (all the course examples) Design Principles.
1/19 Component Design On-demand Learning Series Software Engineering of Web Application - Principles of Good Component Design Hunan University, Software.
An Approach to Test Autonomic Containers Ronald Stevens (IEEE Computer Society & ACM Student Member) August 1, 2006 REU Sponsored by NSF.
CSE 303 – Software Design and Architecture
Life Long Assure (Non-linked Participating limited pay Whole life plan ) ·
1 Software testing. 2 Testing Objectives Testing is a process of executing a program with the intent of finding an error. A good test case is in that.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
Emergent Robustness in Software Systems through Decentralized Adaptation: an Ecologically-Inspired ALife Approach Franck Fleurey, Benoit Baudry, Benoit.
UHD::3320::CH121 DESIGN PHASE Chapter 12. UHD::3320::CH122 Design Phase Two Aspects –Actions which operate on data –Data on which actions operate Two.
BioRAT: Extracting Biological Information from Full-length Papers David P.A. Corney, Bernard F. Buxton, William B. Langdon and David T. Jones Bioinformatics.
Dale Roberts Object Oriented Programming using Java - Introduction Dale Roberts, Lecturer Computer Science, IUPUI Department.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
DEVS Based Modeling and Simulation of the CORBA POA F. Bernardi, E. de Gentili, Pr. J.F. Santucci {bernardi, gentili, University.
Understanding Work Teams
Open-Eye Georgios Androulidakis National Technical University of Athens.
Lecture 2 Intro. To Software Engineering and Object-Oriented Programming (1/2)
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Distributed Models for Decision Support Jose Cuena & Sascha Ossowski Pesented by: Gal Moshitch & Rica Gonen.
Robust Design Optimization (RDO) easy and flexible to use Introduction Dynardo Services.
1.2 Unifying Themes of Biology KEY CONCEPT Unifying themes connect concepts from many fields of biology.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Test Case Designing UNIT - 2. Topics Test Requirement Analysis (example) Test Case Designing (sample discussion) Test Data Preparation (example) Test.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
GCS400 Lift & Tilt Dozer Control System
Bacterial Reproduction. 2/22/20162 Introduction Bacteria can reproduce in one of two ways: 1. Asexually 2. Sexually.
CS223: Software Engineering Lecture 14: Architectural Patterns.
1 Chapter 22 Distributed DBMS Concepts and Design CS 157B Edward Chen.
03/30/031 ECE Digital System Design & Synthesis Lecture Design Partitioning for Synthesis Strategies  Partition for design reuse  Keep related.
Design CS 470 – Software Engineering I Sheldon X. Liang, PH.D.
Lecture 2 Intro. To Software Engineering and Object-Oriented Programming (1/2)
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Hashing (part 2) CSE 2011 Winter March 2018.
Software Design.
Software Testing.
Bacterial Reproduction
PT0-001 Braindumps Questions
Graphing systems of linear equations and inequalities
Lecture 15: Data Cleaning for ML
PPT and video are due no later than February 15, 2019
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Computation in the Wild Staphanie Forrest Justin Balthrop Matthew Glickman David Ackley Presented by Montana Low

Complexity, Modularity, Linearity ● Modularity makes complexity more manageable ● Linear systems are decomposable into independent modules with minimal interactions.

Autonomy, Lifespan and Reproduction ● Individual components must be self-reliant and autonomous, able to function without depending on a consistent global design to guarantee safe interactions. ● Survivability is more important than correctness ● Successful software is copied, unsuccessful software is not.

Disposability, Adaptation and Homeostasis ● Make components modular enough that the death of a single one is not fatal to the whole ● Adaptation is key for long term success ● Homeostasis should be used

● Two strings match if they are identical in at least r contiguous locations ● Detectors are randomly generated ● LYSIS uses negative detection ● If a detector survives the tolerization period, it becomes mature ● Detectors use activation thresholds, with decay over time ● Detectors can become long lived through a costimulatory process ● Detectors within a set sensitize each other upon activiation within a time horizon

LISYS Architecture

Lifecycle of a detector in LISYS

TCP Port Scans Stealth and Noisy

Full nmap port scan