SlideShare une entreprise Scribd logo
1  sur  2
Abstract

Mission critical systems, initially thought of as something that strictly belongs to a military
setting are increasingly becoming commonplace. It may not be easily perceived but most of the
systems today (military or industrial) are mission critical. Moreover, a rapid increase in the
structural complexity of these systems not only leads to an increase in benign faults but open
doors to malicious entities. Over the years, these malicious entities in cyber-space have grown
smarter and extremely resourceful. Therefore, mission assurance is a growingly important
necessity.

Mission assurance is a generic term encompassing diverse measures required to make the
critical operations (missions) more resilient. In this dissertation proposal, the focus is
specifically on mission survivability (a subset of mission assurance), which is the ability of a
system to fulfill its mission in a timely manner. It generally involves four layers of security:
prevention, detection, recovery and adaptation. The first two layers, viz. prevention and
detection, are meant to provide a strong defense. If these two layers fail in protecting the
system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on
the recovery phase, it is quite possible that the mission will fail due to lack of any further
countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer
of defense, they are generally activated during or after the recovery phase. Without a
successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore,
mission critical systems need the provisioning of another layer of defense beyond the
conventional recovery phase.

The attack model in this research realistically represents today’s era of cyber warfare and
competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An
aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks.
Thus, they are more capable of hiding longer and corrupting the final mission response. Current
literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle.
However, when a certain conditions are met (like, contingency plan activated on discovery), a
stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived
state of the system (like success/failure of the attempted attack). Consequently, the defense
scheme employs deceptive and adaptive measures to ensure mission survivability against such
attackers.

The proposed framework focuses on ensuring mission survivability against stealthy attackers by
employing a deception-based secure proactive recovery scheme. This scheme has three major
components. The first component is the surreptitious detection of signs of intrusion without
raising an alert. Since this step is based entirely on the host intrusion detection system, there is
a need to ensure that it is working tamper-proof at all times. This brings us to the classic
problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies
are employed that leverage the parallelism offered by multi-core architecture for increased
effectiveness. Second component is the scheme to make detection information invisible and
inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT)
circuitry on the system processor. Third component is the use of deception-based recovery
scheme to increase the probability of mission survival. So far, a centralized system employing
this scheme has been developed. A multi-phase evaluation methodology has also been
developed for performance evaluation of this system under realistic operating conditions.
Results are found to be promising with low time and performance overhead.

Future work involves enhancing this solution for its deployment in a decentralized environment
while still maintaining its tamper-resistance and mission survivability properties.

Contenu connexe

En vedette

Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research ProposalChinta Musundi-Beez
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1Momy Saikia
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sampleVanessa Cuesta
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaNeil Kimberley
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbkKary Adi
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Vicki Shaw
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSMuneer Samnani
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeLeik Hong, Leow 廖翊翃
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛSparknsk
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceQuintilesIMS Asia Pacific
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributionszukun
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your AccountEdel14201341
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasRafa Cofiño
 
文件传输技术发展与产品趋势
文件传输技术发展与产品趋势文件传输技术发展与产品趋势
文件传输技术发展与产品趋势PMCamp
 

En vedette (15)

Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbk
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACS
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About Me
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
 
Usabilidad
UsabilidadUsabilidad
Usabilidad
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performance
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your Account
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
 
文件传输技术发展与产品趋势
文件传输技术发展与产品趋势文件传输技术发展与产品趋势
文件传输技术发展与产品趋势
 

Similaire à Dissertation Proposal Abstract

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...IJNSA Journal
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemCSCJournals
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...Symantec
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecCheapSSLsecurity
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyRapidSSLOnline.com
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfAnnaRose80
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systemsUltraUploader
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?nathan816428
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkchristophefeltus
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow IntegrityMohammad Golyani
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...christophefeltus
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architectureUltraUploader
 

Similaire à Dissertation Proposal Abstract (20)

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow Integrity
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
 

Plus de Ruchika Mehresh

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generationRuchika Mehresh
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeRuchika Mehresh
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentationRuchika Mehresh
 

Plus de Ruchika Mehresh (7)

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
 
PNUTS
PNUTSPNUTS
PNUTS
 
Centrifuge
CentrifugeCentrifuge
Centrifuge
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentation
 
Pnuts
PnutsPnuts
Pnuts
 
Pnuts Review
Pnuts ReviewPnuts Review
Pnuts Review
 

Dernier

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Dernier (20)

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Dissertation Proposal Abstract

  • 1. Abstract Mission critical systems, initially thought of as something that strictly belongs to a military setting are increasingly becoming commonplace. It may not be easily perceived but most of the systems today (military or industrial) are mission critical. Moreover, a rapid increase in the structural complexity of these systems not only leads to an increase in benign faults but open doors to malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Therefore, mission assurance is a growingly important necessity. Mission assurance is a generic term encompassing diverse measures required to make the critical operations (missions) more resilient. In this dissertation proposal, the focus is specifically on mission survivability (a subset of mission assurance), which is the ability of a system to fulfill its mission in a timely manner. It generally involves four layers of security: prevention, detection, recovery and adaptation. The first two layers, viz. prevention and detection, are meant to provide a strong defense. If these two layers fail in protecting the system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on the recovery phase, it is quite possible that the mission will fail due to lack of any further countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer of defense, they are generally activated during or after the recovery phase. Without a successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore, mission critical systems need the provisioning of another layer of defense beyond the conventional recovery phase. The attack model in this research realistically represents today’s era of cyber warfare and competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks. Thus, they are more capable of hiding longer and corrupting the final mission response. Current literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle. However, when a certain conditions are met (like, contingency plan activated on discovery), a stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
  • 2. attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived state of the system (like success/failure of the attempted attack). Consequently, the defense scheme employs deceptive and adaptive measures to ensure mission survivability against such attackers. The proposed framework focuses on ensuring mission survivability against stealthy attackers by employing a deception-based secure proactive recovery scheme. This scheme has three major components. The first component is the surreptitious detection of signs of intrusion without raising an alert. Since this step is based entirely on the host intrusion detection system, there is a need to ensure that it is working tamper-proof at all times. This brings us to the classic problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies are employed that leverage the parallelism offered by multi-core architecture for increased effectiveness. Second component is the scheme to make detection information invisible and inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT) circuitry on the system processor. Third component is the use of deception-based recovery scheme to increase the probability of mission survival. So far, a centralized system employing this scheme has been developed. A multi-phase evaluation methodology has also been developed for performance evaluation of this system under realistic operating conditions. Results are found to be promising with low time and performance overhead. Future work involves enhancing this solution for its deployment in a decentralized environment while still maintaining its tamper-resistance and mission survivability properties.