2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)最新文献

筛选
英文 中文
An intrusion-tolerant firewall design for protecting SIEM systems 一种用于保护SIEM系统的入侵容忍防火墙设计
Miguel García, N. Neves, A. Bessani
{"title":"An intrusion-tolerant firewall design for protecting SIEM systems","authors":"Miguel García, N. Neves, A. Bessani","doi":"10.1109/DSNW.2013.6615538","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615538","url":null,"abstract":"Nowadays, organizations are resorting to Security Information and Event Management (SIEM) systems to monitor and manage their network infrastructures. SIEMs employ a data collection capability based on many sensors placed in critical points of the network, which forwards events to a core facility for processing and support different forms of analysis (e.g., report attacks in near real time, inventory management, risk assessment). In this paper, we will focus on the defense of the core facility components by presenting a new firewall design that is resilient to very harsh failure scenarios. In particular, it tolerates not only external attacks but also the intrusion of some of its components. The firewall employs a two level filtering scheme to increase performance and to allow for some flexibility on the selection of fault-tolerance mechanisms. The first filtering stage efficiently eliminates the most common forms of attacks, while the second stage supports application rules for a more sophisticated analysis of the traffic. The fault tolerance mechanisms are based on a detection and recovery approach for the first stage, while the second stage uses state machine replication and voting.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
BARLEY: Modelling program behavior with resource usage 利用资源使用对程序行为进行建模
Kevin Leach
{"title":"BARLEY: Modelling program behavior with resource usage","authors":"Kevin Leach","doi":"10.1109/DSNW.2013.6615519","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615519","url":null,"abstract":"Control flow graphs (CFG) have long been an effective and elegant way to represent program execution. In particular, many anomaly detection systems employ CFGs. Unfortunately, typical CFG-based systems rely on inaccurate or impractical heuristics. For example, the state space may be restricted by considering only a call graph, thus reducing accuracy and precision. In this paper, we combine control flow graphs with resource consumption information to more accurately model a program's behavior during execution. Intuitively, this technique allows access to more information within each state, providing opportunities for more accurate decisions when considering anomalous behavior. Additionally, because we do not need as many states to represent an application's execution, we can achieve lower overhead than existing CFG-based systems. We anticipate this technique can be used to detect jump-based return-oriented programming (ROP) attacks on the Linux platform.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing service failures by failure and workload aware load balancing in SaaS clouds 通过SaaS云中的故障和工作负载感知负载平衡来减少服务故障
A. Roy, R. Ganesan, D. Dash, S. Sarkar
{"title":"Reducing service failures by failure and workload aware load balancing in SaaS clouds","authors":"A. Roy, R. Ganesan, D. Dash, S. Sarkar","doi":"10.1109/DSNW.2013.6615511","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615511","url":null,"abstract":"SLA violations are typically viewed as service failures. If service fails once, it will fail again unless remedial action is taken. In a virtualized environment, a common remedial action is to restart or reboot a virtual machine (VM). In this paper we present, a VM live-migration policy that is aware of SLA threshold violations of workload response time, physical machine (PM) and VM utilization as well as availability violations at the PM and VM. In the migration policy we take into account PM failures and VM (software) failures as well as workload features such as burstiness (coefficient of variation or CoV >1) which calls for caution during the selection of target PM when migrating these workloads. The proposed policy also considers migration of a VM when the utilization of the physical machine hosting the VM approaches its utilization threshold. We propose an algorithm that detects proactive triggers for remedial action, selects a VM (for migration) and also suggests a possible target PM. We show the efficacy of our proposed approach by plotting the decrease in the number of SLA violations in a system using our approach over existing approaches that do not trigger migration in response to non-availability related SLA violations, via discrete event simulation of a relevant case study.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131176494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SCoRe: An across-the-board metric for computer systems resilience benchmarking SCoRe:计算机系统弹性基准的全面度量
Raquel Almeida, Afonso Araújo Neto, M. Vieira
{"title":"SCoRe: An across-the-board metric for computer systems resilience benchmarking","authors":"Raquel Almeida, Afonso Araújo Neto, M. Vieira","doi":"10.1109/DSNW.2013.6615542","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615542","url":null,"abstract":"Resilience benchmarking is currently the focus of many research initiatives. Assessing and comparing computer systems under changing environments is becoming crucial due to the dynamic characteristics of modern computing environments. Although several metrics have been proposed over the years, there is no universally accepted resilience metric, which hampers the definition of representative, useful, and accepted benchmarks. In this paper we propose a resilience metric, the Specific Corrected Resilience (SCoRe), which portrays the ability of the system to keep operating with a desired level of quality, in spite of the imposed stress, opening the way for benchmarking the resilience of computer systems.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130847156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and tolerating data corruptions due to device driver defects 检测和容忍由于设备驱动程序缺陷造成的数据损坏
F. Fucci
{"title":"Detecting and tolerating data corruptions due to device driver defects","authors":"F. Fucci","doi":"10.1109/DSNW.2013.6615522","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615522","url":null,"abstract":"Critical systems widely depend on operating systems to perform their mission. Device drivers are a critical and defect-prone part of operating systems. Software defects in device drivers often cause corruption of data that may lead to data losses, that are a significant source of costs for large enterprise systems. This paper describes an ongoing research that aims at mitigating the impact of data corruption due to device driver defects on the availability and the integrity of data. We discuss a methodology for run-time detection and the tolerance of protocol violations in device drivers and then we present a preliminary activity that we are currently performing.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique 基于多目标分布式约束优化技术的网络安全问题
Tenda Okimoto, Naoto Ikegai, Katsumi Inoue, H. Okada, Tony Ribeiro, H. Maruyama
{"title":"Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique","authors":"Tenda Okimoto, Naoto Ikegai, Katsumi Inoue, H. Okada, Tony Ribeiro, H. Maruyama","doi":"10.1109/DSNW.2013.6615540","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615540","url":null,"abstract":"A cyber security problem is an important application domain for systems resilience. The increase of malware, computer viruses, and intensive cyber attacks are serious problems for our information society. In this paper, we introduce a new presentation of a cyber security problem. Our model is based on a Multi-Objective Distributed Constraint Optimization Problem (MO-DCOP) which is a fundamental problem that can formalize various applications related to multi-agent cooperation. MO-DCOP is suitable for modeling a cyber security problem, since cyber security problems involve multiple criteria, e.g., risk (security), surveillance (privacy) and cost. Furthermore, MO-DCOP is a decentralized model. In this model, variables and constraints are distributed among agents. Since there exists no single agent which maintains all informations, it is resilient against intensive cyber attacks. Furthermore, we develop a novel algorithm for solving a cyber security problem which utilizes well-known and widely used branch and bound technique and depth-first search strategy and finds all trade-off solutions. We also propose the extension of this algorithm which utilizes a preprocessing technique called soft Arc Consistency. The softAC is a well-known preprocessing technique which transforms a constraint optimization problem into a simplified problem that can be solved efficiently. In the experiments, we examine the run time of our proposed algorithms in cyber security problems and show that our algorithms can solve cyber security problems quickly.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments 主题演讲:网络物理系统操作者的认知状态检测:实验设计
R. Maxion
{"title":"Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments","authors":"R. Maxion","doi":"10.1109/DSNW.2013.6615527","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615527","url":null,"abstract":"Summary form only given. Operators of cyber-physical systems, especially those in critical infrastructure like hospitals, power and water plants, telecommunications, etc., are prone to mood changes that can affect their ability to control systems or to avoid error. Moods, especially stress, can affect fine motor control due to the release of primary stress hormones in the brain that prepare the body for a flight-or-fight response to a perceived adverse event. Since fine motor control is what we use when we type on a keyboard, changes in mental state - mood, stress, etc. - might be detectable by observing changes in operator typing rhythms. Such changes, due to stress or anxiety, might also manifest in users/operators who have malicious intent, as in theft of corporate or military sensitive information (e.g., the WikiLeaks case). To determine whether or not such changes in typing rhythms can be detected will take careful experimentation. This talk will discuss the design of experiments to test this idea, providing a framework for thinking about and planning a suite of activities to demonstrate the feasibility of detecting stress/emotion through the keyboard.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the dependability of FPGA-based real-time embedded systems with partial dynamic reconfiguration 采用局部动态重构技术提高fpga实时嵌入式系统的可靠性
J. Nunes
{"title":"Improving the dependability of FPGA-based real-time embedded systems with partial dynamic reconfiguration","authors":"J. Nunes","doi":"10.1109/DSNW.2013.6615521","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615521","url":null,"abstract":"This paper explores advances in reconfiguration properties of SRAM-based FPGAs to improve the resilience of real-time embedded systems that use this technology. The effects of radiation on these devices are described and the applicability of the most used fault tolerance approaches is investigated. It finishes proposing a few improvements on these methodologies and discusses the roadmap to reach that goal, presenting the on-going and the future work.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122187999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data fusion-base anomay detection in networked critical infrastructures 基于数据融合的网络化关键基础设施异常检测
B. Genge, C. Siaterlis, Georgios Karopoulos
{"title":"Data fusion-base anomay detection in networked critical infrastructures","authors":"B. Genge, C. Siaterlis, Georgios Karopoulos","doi":"10.1109/DSNW.2013.6615505","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615505","url":null,"abstract":"The dramatic increase in the use of Information and Communication Technologies (ICT) within Networked Critical Infrastructures (NCIs), e.g., the power grid, has lead to more efficient and flexible installations as well as new services and features, e.g., remote monitoring and control. Nevertheless, this has not only exposed NCIs to typical ICT systems attacks, but also to a new breed of cyber-physical attacks. To alleviate these issues, in this paper we propose a novel approach for detecting cyber-physical anomalies in NCIs using the concept of Cyber-physical data fusion. By employing Dempster-Shafer's “Theory of Evidence” we combine knowledge from the cyber and physical dimension of NCIs in order to achieve an Anomaly Detection System (ADS) capable to detect even small disturbances that are not detected by traditional approaches. The proposed ADS is validated in a scenario assessing the consequences of Distributed Denial of Service (DDoS) attacks on Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) and the propagation of such disturbances to the operation of a simulated power grid.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Workshop on reliability and security data analysis RSDA 2013 可靠性与安全数据分析研讨会
C. Martino, A. Pecchia, Jon Stearley
{"title":"Workshop on reliability and security data analysis RSDA 2013","authors":"C. Martino, A. Pecchia, Jon Stearley","doi":"10.1109/DSNW.2013.6615504","DOIUrl":"https://doi.org/10.1109/DSNW.2013.6615504","url":null,"abstract":"Computer systems are intertwined in many modern human activities and, more importantly, they play key roles in critical domains. As such, it is critically important to assess the dependability of computing systems. Data collected under real workload conditions can provide troves of valuable information about the stresses the systems encounter and their responses to them. Relevant data includes text logs and numeric data from application, system, network, and environmental sensors. The inherent value of reliability and security data is well recognized by practitioners, academia, and industry. Effective analysis deepens our understanding of the systems, ranging from failure causes to the progression of malicious attacks, and in turn enables stronger designs and better monitoring strategies.","PeriodicalId":377784,"journal":{"name":"2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信