首页 > 最新文献

SSRS '03最新文献

英文 中文
A biological programming model for self-healing 一个自我修复的生物程序模型
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036929
S. George, David E. Evans, Steven A. Marchette
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. By adopting properties of biological systems, we hope to design systems that operate adequately even in the presence of catastrophic failures and large scale attacks. We describe a programming paradigm based on the actions of biological cells and demonstrate the ability of systems built using our model to survive massive failures. Traditional methods of system design require explicit programming for fault tolerance, which adds substantial costs and complexity to the design, implementation and testing phases. Our approach provides implicit fault tolerance by using simple programs constructed following guiding principles derived from observing nature. We illustrate our model with experiments producing simple structures and apply it to design a distributed wireless file service for ad hoc wireless networks.
面对广泛变化的环境,生物系统表现出显著的适应性和鲁棒性。通过采用生物系统的特性,我们希望设计出即使在存在灾难性故障和大规模攻击的情况下也能充分运行的系统。我们描述了一种基于生物细胞行为的编程范式,并展示了使用我们的模型构建的系统在大规模故障中生存的能力。传统的系统设计方法需要明确的容错编程,这给设计、实现和测试阶段增加了大量的成本和复杂性。我们的方法通过使用简单的程序来提供隐式容错,这些程序是根据观察自然的指导原则构造的。通过实验验证了该模型的简单结构,并将其应用于自组织无线网络的分布式无线文件服务设计。
{"title":"A biological programming model for self-healing","authors":"S. George, David E. Evans, Steven A. Marchette","doi":"10.1145/1036921.1036929","DOIUrl":"https://doi.org/10.1145/1036921.1036929","url":null,"abstract":"Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. By adopting properties of biological systems, we hope to design systems that operate adequately even in the presence of catastrophic failures and large scale attacks. We describe a programming paradigm based on the actions of biological cells and demonstrate the ability of systems built using our model to survive massive failures. Traditional methods of system design require explicit programming for fault tolerance, which adds substantial costs and complexity to the design, implementation and testing phases. Our approach provides implicit fault tolerance by using simple programs constructed following guiding principles derived from observing nature. We illustrate our model with experiments producing simple structures and apply it to design a distributed wireless file service for ad hoc wireless networks.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A holistic approach to service survivability 服务可生存性的整体方法
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036923
A. Keromytis, Janak J. Parekh, Philip Gross, G. Kaiser, V. Misra, Jason Nieh, D. Rubenstein, S. Stolfo
We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion. Contrary to the ad hoc manner in which contemporary survivable systems are built-using isolated, independent security mechanisms such as firewalls, intrusion detection systems and software sandboxes-SABER integrates several different technologies in an attempt to provide a unified framework for responding to the wide range of attacks malicious insiders and outsiders can launch. This coordinated multi-layer approach will be capable of defending against attacks targeted at various levels of the network stack, such as congestion-based DoS attacks, software-based DoS or code-injection attacks, and others. Our fundamental insight is that while multiple lines of defense are useful, most conventional, uncoordinated approaches fail to exploit the full range of available responses to incidents. By coordinating the response, the ability to survive successful security breaches increases substantially. We discuss the key components of SABER, how they will be integrated together, and how we can leverage on the promising results of the individual components to improve survivability in a variety of coordinated attack scenarios. SABER is currently in the prototyping stages, with several interesting open research topics.
我们提出了SABER(生存性架构:阻止、逃避、反应),这是一种提议的生存性架构,通过使用几种安全和生存性机制,以自动化和协调的方式阻止、逃避和响应各种攻击。与当代可生存系统的临时构建方式相反——使用隔离的、独立的安全机制,如防火墙、入侵检测系统和软件沙箱——saber集成了几种不同的技术,试图提供一个统一的框架,以响应恶意内部人员和外部人员可能发起的各种攻击。这种协调的多层方法将能够防御针对网络堆栈各个级别的攻击,例如基于拥塞的DoS攻击、基于软件的DoS或代码注入攻击等。我们的基本见解是,虽然多道防线是有用的,但大多数传统的、不协调的方法无法利用对事件的全部可用反应。通过协调响应,成功抵御安全漏洞的能力将大大提高。我们讨论了SABER的关键组件,它们将如何集成在一起,以及我们如何利用各个组件的有希望的结果来提高各种协同攻击场景中的生存能力。SABER目前处于原型阶段,有几个有趣的开放研究课题。
{"title":"A holistic approach to service survivability","authors":"A. Keromytis, Janak J. Parekh, Philip Gross, G. Kaiser, V. Misra, Jason Nieh, D. Rubenstein, S. Stolfo","doi":"10.1145/1036921.1036923","DOIUrl":"https://doi.org/10.1145/1036921.1036923","url":null,"abstract":"We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion. Contrary to the ad hoc manner in which contemporary survivable systems are built-using isolated, independent security mechanisms such as firewalls, intrusion detection systems and software sandboxes-SABER integrates several different technologies in an attempt to provide a unified framework for responding to the wide range of attacks malicious insiders and outsiders can launch.\u0000 This coordinated multi-layer approach will be capable of defending against attacks targeted at various levels of the network stack, such as congestion-based DoS attacks, software-based DoS or code-injection attacks, and others. Our fundamental insight is that while multiple lines of defense are useful, most conventional, uncoordinated approaches fail to exploit the full range of available responses to incidents. By coordinating the response, the ability to survive successful security breaches increases substantially.\u0000 We discuss the key components of SABER, how they will be integrated together, and how we can leverage on the promising results of the individual components to improve survivability in a variety of coordinated attack scenarios. SABER is currently in the prototyping stages, with several interesting open research topics.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130295809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Attack resistant cache replacement for survivable services 为可生存服务替换抗攻击缓存
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036928
V. Manivel, M. Ahamad, H. Venkateswaran
Many distributed services are susceptible to attacks by malicious clients that can significantly degrade their performance. Scalable distributed services make use of a variety of techniques which are vulnerable to such attacks. We explore the survivability of services when attacks target the scalability techniques employed by the services. In particular, we explore how the effectiveness of caching can be degraded when malicious clients manipulate cache management algorithms. We present an attack resistant replacement algorithm and show that it is much more effective in dealing with attacks compared to other widely deployed replacement algorithms.
许多分布式服务很容易受到恶意客户端的攻击,这会大大降低它们的性能。可扩展的分布式服务使用各种容易受到此类攻击的技术。当攻击以服务采用的可伸缩性技术为目标时,我们将探讨服务的生存能力。特别是,我们探讨了当恶意客户端操纵缓存管理算法时,缓存的有效性是如何降低的。我们提出了一种抗攻击替换算法,并表明与其他广泛部署的替换算法相比,它在处理攻击方面更加有效。
{"title":"Attack resistant cache replacement for survivable services","authors":"V. Manivel, M. Ahamad, H. Venkateswaran","doi":"10.1145/1036921.1036928","DOIUrl":"https://doi.org/10.1145/1036921.1036928","url":null,"abstract":"Many distributed services are susceptible to attacks by malicious clients that can significantly degrade their performance. Scalable distributed services make use of a variety of techniques which are vulnerable to such attacks. We explore the survivability of services when attacks target the scalability techniques employed by the services. In particular, we explore how the effectiveness of caching can be degraded when malicious clients manipulate cache management algorithms. We present an attack resistant replacement algorithm and show that it is much more effective in dealing with attacks compared to other widely deployed replacement algorithms.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132293805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling insecurity: policy engineering for survivability 不安全性建模:可生存性的策略工程
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036931
P. Naldurg, R. Campbell
We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ways. First, we contend that traditional safety-property modeling cannot provide any guarantees when the policy enforcement mechanisms are compromised. Therefore, we extend traditional access control specifications by modeling insecure states and transitions explicitly, to describe possible system behavior after compromise. Next, we observe that it may not always possible to recover from an insecure state, and both compromise and recovery impact the availability of information. Based on these observations, we refine traditional information security properties as liveness assertions and explicitly add recovery actions to our specifications, to guarantee resources are available to legitimate users infinitely often, in spite of malicious attacks or inadvertent compromise. We explain our process using an example behavioral specification and show how we can define different measures of availability and verify them using standard model-checking techniques within this framework.
我们提出了一个访问控制策略规范和验证过程,它非常适合于对信息资源在入侵威胁下的生存能力进行建模。我们的过程在许多方面与传统的政策工程方法不同。首先,我们认为当策略执行机制受到损害时,传统的安全属性建模不能提供任何保证。因此,我们通过显式地建模不安全状态和转换来扩展传统的访问控制规范,以描述入侵后可能的系统行为。接下来,我们观察到,从不安全状态恢复可能并不总是可能的,并且折衷和恢复都会影响信息的可用性。基于这些观察,我们将传统的信息安全属性细化为活动性断言,并显式地将恢复操作添加到规范中,以保证合法用户可以无限频繁地使用资源,而不受恶意攻击或无意损害的影响。我们使用一个示例行为规范来解释我们的过程,并展示我们如何定义可用性的不同度量,并在此框架内使用标准模型检查技术来验证它们。
{"title":"Modeling insecurity: policy engineering for survivability","authors":"P. Naldurg, R. Campbell","doi":"10.1145/1036921.1036931","DOIUrl":"https://doi.org/10.1145/1036921.1036931","url":null,"abstract":"We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ways. First, we contend that traditional safety-property modeling cannot provide any guarantees when the policy enforcement mechanisms are compromised. Therefore, we extend traditional access control specifications by modeling insecure states and transitions explicitly, to describe possible system behavior after compromise.\u0000 Next, we observe that it may not always possible to recover from an insecure state, and both compromise and recovery impact the availability of information. Based on these observations, we refine traditional information security properties as liveness assertions and explicitly add recovery actions to our specifications, to guarantee resources are available to legitimate users infinitely often, in spite of malicious attacks or inadvertent compromise. We explain our process using an example behavioral specification and show how we can define different measures of availability and verify them using standard model-checking techniques within this framework.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
SSRS '03
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1