M. Atighetchi, P. Rubel, P. Pal, Jennifer Chong, L. Sudin
{"title":"Networking Aspects in the DPASA Survivability Architecture: An Experience Report","authors":"M. Atighetchi, P. Rubel, P. Pal, Jennifer Chong, L. Sudin","doi":"10.1109/NCA.2005.35","DOIUrl":null,"url":null,"abstract":"The same network infrastructure that is essential for the operation of today's high valued distributed systems can also be misused by malicious attackers. Experience shows that implementing absolute security or preventing cyber attacks completely is infeasible when systems must be highly interconnected and comprise of COTS components with unknown security characteristics. Therefore, focus is shifting towards making high valued distributed systems survivable, enabling them to operate through attacks. This paper focuses on the networking aspects of the DPASA survivability architecture, which was used recently to defense-enable a DoD information system","PeriodicalId":188815,"journal":{"name":"Fourth IEEE International Symposium on Network Computing and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth IEEE International Symposium on Network Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2005.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The same network infrastructure that is essential for the operation of today's high valued distributed systems can also be misused by malicious attackers. Experience shows that implementing absolute security or preventing cyber attacks completely is infeasible when systems must be highly interconnected and comprise of COTS components with unknown security characteristics. Therefore, focus is shifting towards making high valued distributed systems survivable, enabling them to operate through attacks. This paper focuses on the networking aspects of the DPASA survivability architecture, which was used recently to defense-enable a DoD information system