DOC PREVIEW
UI CS 448 - Introduction

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Introduction – This introduction is based on various resources, including » [Ellison99] Survivable Network Systems: An Emerging Discipline » Tech Report CMU/SEI-97-TR-013, by Ellison, et.al., » revised May 1999 – Note that the CMU/SEI group had many papers on the subject. Here we start with an early paper and will look at newer work afterwards. – Whereas 10 years have passed, most of the general arguments still hold. Sequence 3 © A.K. Krings 2011 1Introduction  Survivability – builds on related fields » security » fault-tolerance » safety » reliability » reuse » performance » verification » testing Sequence 3 © A.K. Krings 2011 2Introduction  Bounded and Unbounded Networks – bounded network » all of the systems parts are controlled by unified administration and can be completely characterized and controlled – unbounded network » radical new levels of organizational integration » integration obliterates traditional organizational boundaries and transforms local operations into components of comprehensive network-resident business processes » example, commercial organizations are integrating operations with business units, suppliers, and customers through large-scale networks that enhance communication and services. These networks combine previously fragmented operations into coherent processes open to many organizational participants. » this new paradigm represents a shift from bounded networks with central control to unbounded networks Sequence 3 © A.K. Krings 2011 3Introduction – unbounded network (cont.) » there is no unified administrative control over its parts » each participant has incomplete view of the whole  must depend on the trust information supplied by its neighbors  cannot exercise control outside of its local domain Ellison99 fig 1 Sequence 3 © A.K. Krings 2011 4Introduction  Survivability – fulfill the mission, in a timely manner, in the presence of attacks, failures, or accidents. » Note, this is only the CMU definition. – Mission » not just the military definition » example of financial system  shutdown (12h) during a power outage caused by hurricane  if the system is down, but preserves integrity and confidentiality of its data and resumes essential services after the environmental stress is over, then the mission is fulfilled  if the same system is down 12 hours during normal conditions than the mission has failed Sequence 3 © A.K. Krings 2011 5Introduction – Attack » events orchestrated by an intelligent adversary » includes intrusion, probes, denial of service » system that assumes defensive positions because of a threat may reduce its functionality and divert additional resources for monitoring and protection – Failure » may be due to  software design error  hardware degradation  human error  corrupted data – Accident » broad range of randomly occurring and potentially damaging events such as natural disasters Sequence 3 © A.K. Krings 2011 6Introduction  Survivability trademarks – must react to damaging effect – must recover – reaction and recovery may take place before underlying cause is identified – cause may never be determined! – mission fulfillment must survive, not any particular subsystem or component – mission must survive even if significant portions of the system are damaged or destroyed Sequence 3 © A.K. Krings 2011 7Introduction  Characteristics of Survivable System – deliver essential services in the face of attack, failure, or accident – maintain essential properties » specified levels of integrity, confidentiality, performance – maintain balance among multiple quality attributes » performance, » security, » reliability, » availability, » fault-tolerance, » modifiability, » affordability. Sequence 3 © A.K. Krings 2011 8Introduction  Characteristics of Survivable System (cont.) What are essential services and properties? – for military » essential services:  maintain overwhelming technical superiority » essential properties:  integrity, confidentiality, level of performance – for public sector » maintain integrity, confidentiality, availability of essential information and financial services in the presence of intrusions/attacks Example: Key question: » What are the essential services within the operational system? Sequence 3 © A.K. Krings 2011 9Introduction – typically there are many services that can be temporarily suspended when a system is dealing with an attack or environmental condition – suspension can help isolating areas affected by intrusion – the mission must survive: » if an essential service is lost it can be replaced with another service that supports mission fulfillment in a different but equivalent way » essential services should include alternate sets of essential services that  need not be simultaneously available  could be mutually exclusive Sequence 3 © A.K. Krings 2011 10Introduction Ellison99 table 1 Sequence 3 © A.K. Krings 2011 11Introduction  What is the difference between – Survivability and Security? – Survivability and Fault-tolerance? Sequence 3 © A.K. Krings 2011 12Introduction  Survivability and Security – Security (typical def. w.r.t. confidentiality, integrity, availability & authenticity, non-reudiation) » the system is either safe or compromised » goal:  prevent intrusion from happening  detect intrusion if it occurred » largely ignores  aspects of recovery  aspects of maintaining services during and after an intrusion – Survivability » components collectively need to accomplish their mission even under attack and despite active intrusions that could effectively damage significant portions of the system » robustness under attack is at least as important as hardness, or resistance to attack Sequence 3 © A.K. Krings 2011 13Introduction » hardness contributes to survivability, BUT » robustness under attack and recoverability are the essential characteristics that distinguish survivability from traditional computer security » survivability benefits from computer security research


View Full Document

UI CS 448 - Introduction

Download Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?