Policy Specification for Non-Local Fault Tolerance in Large Distributed Information Systems

作者: Philip E. Varner

DOI:

关键词:

摘要: Abstract : The services provided by critical infrastructure systems are essential to the operation of modem society. These include financial payments system, transportation systems, military command and control electric power grid, telecommunications including Internet. Widespread failure any these system might result in severe loss or perhaps human injury. Critical rely heavily on distributed information for operation. must therefore be dependable; that is, they "deliver service can justifiably trusted." Traditional dependability alone does not provide a rich enough model deal with faults large, operating hostile environments. require simply but instead survivability. Informally, survivability is when has "the ability continue (possibly degraded different) given environment various events cause major damage its environment." One means achieving non-local fault tolerance, where affect significant portions network detected handled coordinated fashion. Our approach doing this system. This takes sensor as input, uses detect faults, responds application reconfiguration. thesis presents TEDL, Time-based Event Detection Language, formal specification reactive policy A translator used synthesize an executable implementation from specification. results using TEDL describe execute several attack scenarios simplified presented.

参考文章(49)
Jean-Philippe Pouzol, Mireille Ducasé, From Declarative Signatures to Misuse IDS recent advances in intrusion detection. pp. 1- 21 ,(2001) , 10.1007/3-540-45474-8_1
Jia-Ling Lin, X.S. Wang, S. Jajodia, Abstraction-based misuse detection: high-level specifications and adaptable strategies ieee computer security foundations symposium. pp. 190- 201 ,(1998) , 10.1109/CSFW.1998.683169
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
John Knight, Chenxi Wang, A security architecture for survivability mechanisms University of Virginia. ,(2001)
R. Sekar, P. Uppuluri, Synthesizing fast intrusion prevention/detection systems from high-level specifications usenix security symposium. pp. 6- 6 ,(1999)
Yiannis Papadopoulos, Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation Model international conference on computer safety reliability and security. pp. 236- 248 ,(2002) , 10.1007/3-540-45732-1_23
Jonathan C. Hill, John C. Knight, Aaron M. Crickenberger, Richard Honhart, Publish and Subscribe with Reply University of Virginia. ,(2002) , 10.21236/ADA478610
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu, ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis european symposium on research in computer security. pp. 435- 450 ,(1992) , 10.1007/BFB0013912
Jonathan C. Hill, John C. Knight, Selective Notification: Combining Forms of Decoupled Addressing for Internet-Scale Command and Alert Dissemination University of Virginia, Department of Computer Science. ,(2003) , 10.21236/ADA436806
Frédéric Cuppens, Rodolphe Ortalo, LAMBDA: A Language to Model a Database for Detection of Attacks recent advances in intrusion detection. pp. 197- 216 ,(2000) , 10.1007/3-540-39945-3_13