SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Abstract

Mission critical systems, initially thought of as something that strictly belongs to a military
setting are increasingly becoming commonplace. It may not be easily perceived but most of the
systems today (military or industrial) are mission critical. Moreover, a rapid increase in the
structural complexity of these systems not only leads to an increase in benign faults but open
doors to malicious entities. Over the years, these malicious entities in cyber-space have grown
smarter and extremely resourceful. Therefore, mission assurance is a growingly important
necessity.

Mission assurance is a generic term encompassing diverse measures required to make the
critical operations (missions) more resilient. In this dissertation proposal, the focus is
specifically on mission survivability (a subset of mission assurance), which is the ability of a
system to fulfill its mission in a timely manner. It generally involves four layers of security:
prevention, detection, recovery and adaptation. The first two layers, viz. prevention and
detection, are meant to provide a strong defense. If these two layers fail in protecting the
system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on
the recovery phase, it is quite possible that the mission will fail due to lack of any further
countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer
of defense, they are generally activated during or after the recovery phase. Without a
successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore,
mission critical systems need the provisioning of another layer of defense beyond the
conventional recovery phase.

The attack model in this research realistically represents today’s era of cyber warfare and
competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An
aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks.
Thus, they are more capable of hiding longer and corrupting the final mission response. Current
literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle.
However, when a certain conditions are met (like, contingency plan activated on discovery), a
stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived
state of the system (like success/failure of the attempted attack). Consequently, the defense
scheme employs deceptive and adaptive measures to ensure mission survivability against such
attackers.

The proposed framework focuses on ensuring mission survivability against stealthy attackers by
employing a deception-based secure proactive recovery scheme. This scheme has three major
components. The first component is the surreptitious detection of signs of intrusion without
raising an alert. Since this step is based entirely on the host intrusion detection system, there is
a need to ensure that it is working tamper-proof at all times. This brings us to the classic
problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies
are employed that leverage the parallelism offered by multi-core architecture for increased
effectiveness. Second component is the scheme to make detection information invisible and
inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT)
circuitry on the system processor. Third component is the use of deception-based recovery
scheme to increase the probability of mission survival. So far, a centralized system employing
this scheme has been developed. A multi-phase evaluation methodology has also been
developed for performance evaluation of this system under realistic operating conditions.
Results are found to be promising with low time and performance overhead.

Future work involves enhancing this solution for its deployment in a decentralized environment
while still maintaining its tamper-resistance and mission survivability properties.

Weitere ähnliche Inhalte

Andere mochten auch

Primerica Smart Loan
Primerica Smart LoanPrimerica Smart Loan
Primerica Smart Loan1dra
 
Research Proposal Template/Sample
Research Proposal Template/SampleResearch Proposal Template/Sample
Research Proposal Template/SampleFahad Aziz
 
Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal Monica Betz
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research ProposalChinta Musundi-Beez
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1Momy Saikia
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sampleVanessa Cuesta
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaNeil Kimberley
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbkKary Adi
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Vicki Shaw
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSMuneer Samnani
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeLeik Hong, Leow 廖翊翃
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛSparknsk
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceQuintilesIMS Asia Pacific
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributionszukun
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your AccountEdel14201341
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasRafa Cofiño
 
文件传输技术发展与产品趋势
文件传输技术发展与产品趋势文件传输技术发展与产品趋势
文件传输技术发展与产品趋势PMCamp
 

Andere mochten auch (20)

Primerica Smart Loan
Primerica Smart LoanPrimerica Smart Loan
Primerica Smart Loan
 
Loan Proposal
Loan ProposalLoan Proposal
Loan Proposal
 
Research Proposal Template/Sample
Research Proposal Template/SampleResearch Proposal Template/Sample
Research Proposal Template/Sample
 
Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal
 
Writing Research Proposal
Writing Research Proposal Writing Research Proposal
Writing Research Proposal
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbk
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACS
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About Me
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
 
Usabilidad
UsabilidadUsabilidad
Usabilidad
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performance
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your Account
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
 
文件传输技术发展与产品趋势
文件传输技术发展与产品趋势文件传输技术发展与产品趋势
文件传输技术发展与产品趋势
 

Ähnlich wie Dissertation Proposal Abstract

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...IJNSA Journal
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemCSCJournals
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...Symantec
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecCheapSSLsecurity
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyRapidSSLOnline.com
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfAnnaRose80
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systemsUltraUploader
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?nathan816428
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkchristophefeltus
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow IntegrityMohammad Golyani
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...christophefeltus
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architectureUltraUploader
 

Ähnlich wie Dissertation Proposal Abstract (20)

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow Integrity
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
 

Mehr von Ruchika Mehresh

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generationRuchika Mehresh
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeRuchika Mehresh
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentationRuchika Mehresh
 

Mehr von Ruchika Mehresh (7)

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
 
PNUTS
PNUTSPNUTS
PNUTS
 
Centrifuge
CentrifugeCentrifuge
Centrifuge
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentation
 
Pnuts
PnutsPnuts
Pnuts
 
Pnuts Review
Pnuts ReviewPnuts Review
Pnuts Review
 

Kürzlich hochgeladen

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Dissertation Proposal Abstract

  • 1. Abstract Mission critical systems, initially thought of as something that strictly belongs to a military setting are increasingly becoming commonplace. It may not be easily perceived but most of the systems today (military or industrial) are mission critical. Moreover, a rapid increase in the structural complexity of these systems not only leads to an increase in benign faults but open doors to malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Therefore, mission assurance is a growingly important necessity. Mission assurance is a generic term encompassing diverse measures required to make the critical operations (missions) more resilient. In this dissertation proposal, the focus is specifically on mission survivability (a subset of mission assurance), which is the ability of a system to fulfill its mission in a timely manner. It generally involves four layers of security: prevention, detection, recovery and adaptation. The first two layers, viz. prevention and detection, are meant to provide a strong defense. If these two layers fail in protecting the system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on the recovery phase, it is quite possible that the mission will fail due to lack of any further countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer of defense, they are generally activated during or after the recovery phase. Without a successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore, mission critical systems need the provisioning of another layer of defense beyond the conventional recovery phase. The attack model in this research realistically represents today’s era of cyber warfare and competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks. Thus, they are more capable of hiding longer and corrupting the final mission response. Current literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle. However, when a certain conditions are met (like, contingency plan activated on discovery), a stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
  • 2. attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived state of the system (like success/failure of the attempted attack). Consequently, the defense scheme employs deceptive and adaptive measures to ensure mission survivability against such attackers. The proposed framework focuses on ensuring mission survivability against stealthy attackers by employing a deception-based secure proactive recovery scheme. This scheme has three major components. The first component is the surreptitious detection of signs of intrusion without raising an alert. Since this step is based entirely on the host intrusion detection system, there is a need to ensure that it is working tamper-proof at all times. This brings us to the classic problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies are employed that leverage the parallelism offered by multi-core architecture for increased effectiveness. Second component is the scheme to make detection information invisible and inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT) circuitry on the system processor. Third component is the use of deception-based recovery scheme to increase the probability of mission survival. So far, a centralized system employing this scheme has been developed. A multi-phase evaluation methodology has also been developed for performance evaluation of this system under realistic operating conditions. Results are found to be promising with low time and performance overhead. Future work involves enhancing this solution for its deployment in a decentralized environment while still maintaining its tamper-resistance and mission survivability properties.