Feedback control applied to survivability: A host-based autonomic defense system

被引:31
|
作者
Kreidl, OP [1 ]
Frazier, TM
机构
[1] MIT, Dept Elect Engn & Comp Sci, Cambridge, MA 02139 USA
[2] Alphatech Inc, Arlington, VA 22203 USA
关键词
computer security; empirical methods; intrusion tolerance; Markovian processes; numerical optimization; sensor uncertainty; stochastic control; survivable systems;
D O I
10.1109/TR.2004.824833
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of information system survivability, or dynamically preserving intended functionality & computational performance, in the face of malicious intrusive activity. A feedback control approach is proposed which enables tradeoffs between the failure cost of a compromised information system and the maintenance cost of ongoing defensive countermeasures. Online implementation features an inexpensive computation architecture consisting of a sensor-driven recursive estimator followed by an estimate-driven response selector. Offline design features a systematic empirical procedure utilizing a suite of mathematical modeling and numerical optimization tools. The engineering challenge is to generate domain models and decision strategies offline via tractable methods, while achieving online effectiveness. We illustrate the approach with experimentation results for a prototype autonomic defense system which protects its host, a Linux-based web-server, against an automated Internet worm attack. The overall approach applies to other types of computer attacks, network-level security and other domains which could benefit from automatic decision-making based on a sequence of sensor measurements.
引用
收藏
页码:148 / 166
页数:19
相关论文
共 50 条
  • [1] Host-based service differentiation with congestion feedback
    Lundqvist, Henrik
    Karlsson, Gunnar
    2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 220 - +
  • [2] Host-based data acquisition system to control pulsed facilities of the accelerator
    Zamriy V.N.
    Physics of Particles and Nuclei Letters, 2016, 13 (5) : 601 - 604
  • [3] Remote attestation of host-based defense via optical channel
    Boggs, Nathaniel
    So, Brenda
    Cui, Ang
    CYBER SENSING 2020, 2020, 11417
  • [4] A Novel Mechanism for Host-Based Intrusion Detection System
    Harshitha, Ch Gayathri
    Rao, M. Kameswara
    Kumar, P. Neelesh
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 527 - 536
  • [5] The Design and Implementation of Host-based Intrusion Detection System
    Lin Ying
    Zhang Yan
    Ou Yang-Jia
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 595 - 598
  • [6] Computer immune model of host-based system scan
    Dong, Jun
    He, Jun
    Huang, Houkuan
    Beifang Jiaotong Daxue Xuebao/Journal of Northern Jiaotong University, 2000, 24 (06): : 84 - 87
  • [7] Host-based Neuron Node Design of a LonWorks System
    Gong, Chenglong
    Liu, Yongqiang
    Feng, Yuan
    He, Naibao
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 63 - 68
  • [8] A study of host-based IDS using system calls
    Yasin, MM
    Awan, AA
    2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 36 - 41
  • [9] A HOST-BASED SECURITY ASSESSMENT ARCHITECTURE FOR INDUSTRIAL CONTROL SYSTEMS
    Rakshit, Abhishek
    Ou, Xinming
    2009 2ND INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS 2009), 2009, : 7 - 12
  • [10] Repurposing host-based therapeutics to control coronavirus and influenza virus
    Li, Cui-Cui
    Wang, Xiao-Jia
    Wang, Hwa-Chain Robert
    DRUG DISCOVERY TODAY, 2019, 24 (03) : 726 - 736