SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Abstract

Mission critical systems, initially thought of as something that strictly belongs to a military
setting are increasingly becoming commonplace. It may not be easily perceived but most of the
systems today (military or industrial) are mission critical. Moreover, a rapid increase in the
structural complexity of these systems not only leads to an increase in benign faults but open
doors to malicious entities. Over the years, these malicious entities in cyber-space have grown
smarter and extremely resourceful. Therefore, mission assurance is a growingly important
necessity.

Mission assurance is a generic term encompassing diverse measures required to make the
critical operations (missions) more resilient. In this dissertation proposal, the focus is
specifically on mission survivability (a subset of mission assurance), which is the ability of a
system to fulfill its mission in a timely manner. It generally involves four layers of security:
prevention, detection, recovery and adaptation. The first two layers, viz. prevention and
detection, are meant to provide a strong defense. If these two layers fail in protecting the
system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on
the recovery phase, it is quite possible that the mission will fail due to lack of any further
countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer
of defense, they are generally activated during or after the recovery phase. Without a
successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore,
mission critical systems need the provisioning of another layer of defense beyond the
conventional recovery phase.

The attack model in this research realistically represents today’s era of cyber warfare and
competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An
aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks.
Thus, they are more capable of hiding longer and corrupting the final mission response. Current
literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle.
However, when a certain conditions are met (like, contingency plan activated on discovery), a
stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived
state of the system (like success/failure of the attempted attack). Consequently, the defense
scheme employs deceptive and adaptive measures to ensure mission survivability against such
attackers.

The proposed framework focuses on ensuring mission survivability against stealthy attackers by
employing a deception-based secure proactive recovery scheme. This scheme has three major
components. The first component is the surreptitious detection of signs of intrusion without
raising an alert. Since this step is based entirely on the host intrusion detection system, there is
a need to ensure that it is working tamper-proof at all times. This brings us to the classic
problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies
are employed that leverage the parallelism offered by multi-core architecture for increased
effectiveness. Second component is the scheme to make detection information invisible and
inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT)
circuitry on the system processor. Third component is the use of deception-based recovery
scheme to increase the probability of mission survival. So far, a centralized system employing
this scheme has been developed. A multi-phase evaluation methodology has also been
developed for performance evaluation of this system under realistic operating conditions.
Results are found to be promising with low time and performance overhead.

Future work involves enhancing this solution for its deployment in a decentralized environment
while still maintaining its tamper-resistance and mission survivability properties.

Weitere ähnliche Inhalte

Was ist angesagt?

non-hodgkin’s-lymphoma
non-hodgkin’s-lymphomanon-hodgkin’s-lymphoma
non-hodgkin’s-lymphoma
Chandan N
 
Digital Elevation Model, Its derivatives and applications
Digital Elevation Model, Its derivatives and applicationsDigital Elevation Model, Its derivatives and applications
Digital Elevation Model, Its derivatives and applications
Shadaab .
 

Was ist angesagt? (20)

Breast Cancer
Breast CancerBreast Cancer
Breast Cancer
 
Surgical Management for Non Small Cell Lung Cancer
Surgical Management for Non Small Cell Lung CancerSurgical Management for Non Small Cell Lung Cancer
Surgical Management for Non Small Cell Lung Cancer
 
Cancer diagnosis and treatment-1.pptx
Cancer diagnosis and treatment-1.pptxCancer diagnosis and treatment-1.pptx
Cancer diagnosis and treatment-1.pptx
 
Cancer Immunotherapy
Cancer ImmunotherapyCancer Immunotherapy
Cancer Immunotherapy
 
Lung cancer
Lung cancerLung cancer
Lung cancer
 
SENTINA Trial
SENTINA TrialSENTINA Trial
SENTINA Trial
 
non-hodgkin’s-lymphoma
non-hodgkin’s-lymphomanon-hodgkin’s-lymphoma
non-hodgkin’s-lymphoma
 
SS 2017: Prevention of cervical cancer
SS 2017: Prevention of cervical cancerSS 2017: Prevention of cervical cancer
SS 2017: Prevention of cervical cancer
 
Castleman Disease : Symptoms, causes, diagnosis and treatment
Castleman Disease : Symptoms, causes, diagnosis and treatmentCastleman Disease : Symptoms, causes, diagnosis and treatment
Castleman Disease : Symptoms, causes, diagnosis and treatment
 
Management of testicular cancers
Management of testicular cancersManagement of testicular cancers
Management of testicular cancers
 
A review on cancer therapy immunotherapy perspective
A review on cancer therapy immunotherapy perspectiveA review on cancer therapy immunotherapy perspective
A review on cancer therapy immunotherapy perspective
 
Recent advances in colorectal carcinoma
Recent advances in colorectal carcinomaRecent advances in colorectal carcinoma
Recent advances in colorectal carcinoma
 
Presentation on breast cancer
Presentation on breast cancerPresentation on breast cancer
Presentation on breast cancer
 
Extragonadal Germ Cells Tumors
Extragonadal Germ Cells TumorsExtragonadal Germ Cells Tumors
Extragonadal Germ Cells Tumors
 
Non invasive bladder growth
Non invasive bladder growthNon invasive bladder growth
Non invasive bladder growth
 
Breast cancer
Breast cancerBreast cancer
Breast cancer
 
How is Radiation Therapy Used to Help Lung Cancer Patients?
How is Radiation Therapy Used to Help Lung Cancer Patients?How is Radiation Therapy Used to Help Lung Cancer Patients?
How is Radiation Therapy Used to Help Lung Cancer Patients?
 
Hotspot Analysis - OGRS2016
Hotspot Analysis - OGRS2016Hotspot Analysis - OGRS2016
Hotspot Analysis - OGRS2016
 
Digital Elevation Model, Its derivatives and applications
Digital Elevation Model, Its derivatives and applicationsDigital Elevation Model, Its derivatives and applications
Digital Elevation Model, Its derivatives and applications
 
skin cancer .ppt
skin cancer .pptskin cancer .ppt
skin cancer .ppt
 

Andere mochten auch

Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal
Monica Betz
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
Chinta Musundi-Beez
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
Momy Saikia
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
Vanessa Cuesta
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
Vicki Shaw
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
Sparknsk
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
zukun
 

Andere mochten auch (20)

Sample research proposal
Sample research proposalSample research proposal
Sample research proposal
 
Primerica Smart Loan
Primerica Smart LoanPrimerica Smart Loan
Primerica Smart Loan
 
Loan Proposal
Loan ProposalLoan Proposal
Loan Proposal
 
Research Proposal Template/Sample
Research Proposal Template/SampleResearch Proposal Template/Sample
Research Proposal Template/Sample
 
Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal
 
Writing Research Proposal
Writing Research Proposal Writing Research Proposal
Writing Research Proposal
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbk
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACS
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About Me
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
 
Usabilidad
UsabilidadUsabilidad
Usabilidad
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performance
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your Account
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
 

Ähnlich wie Dissertation Proposal Abstract

Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
AnnaRose80
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
UltraUploader
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
UltraUploader
 

Ähnlich wie Dissertation Proposal Abstract (20)

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow Integrity
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
 

Mehr von Ruchika Mehresh

Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Ruchika Mehresh
 

Mehr von Ruchika Mehresh (7)

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
 
PNUTS
PNUTSPNUTS
PNUTS
 
Centrifuge
CentrifugeCentrifuge
Centrifuge
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentation
 
Pnuts
PnutsPnuts
Pnuts
 
Pnuts Review
Pnuts ReviewPnuts Review
Pnuts Review
 

Kürzlich hochgeladen

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 

Kürzlich hochgeladen (20)

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 

Dissertation Proposal Abstract

  • 1. Abstract Mission critical systems, initially thought of as something that strictly belongs to a military setting are increasingly becoming commonplace. It may not be easily perceived but most of the systems today (military or industrial) are mission critical. Moreover, a rapid increase in the structural complexity of these systems not only leads to an increase in benign faults but open doors to malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Therefore, mission assurance is a growingly important necessity. Mission assurance is a generic term encompassing diverse measures required to make the critical operations (missions) more resilient. In this dissertation proposal, the focus is specifically on mission survivability (a subset of mission assurance), which is the ability of a system to fulfill its mission in a timely manner. It generally involves four layers of security: prevention, detection, recovery and adaptation. The first two layers, viz. prevention and detection, are meant to provide a strong defense. If these two layers fail in protecting the system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on the recovery phase, it is quite possible that the mission will fail due to lack of any further countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer of defense, they are generally activated during or after the recovery phase. Without a successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore, mission critical systems need the provisioning of another layer of defense beyond the conventional recovery phase. The attack model in this research realistically represents today’s era of cyber warfare and competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks. Thus, they are more capable of hiding longer and corrupting the final mission response. Current literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle. However, when a certain conditions are met (like, contingency plan activated on discovery), a stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
  • 2. attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived state of the system (like success/failure of the attempted attack). Consequently, the defense scheme employs deceptive and adaptive measures to ensure mission survivability against such attackers. The proposed framework focuses on ensuring mission survivability against stealthy attackers by employing a deception-based secure proactive recovery scheme. This scheme has three major components. The first component is the surreptitious detection of signs of intrusion without raising an alert. Since this step is based entirely on the host intrusion detection system, there is a need to ensure that it is working tamper-proof at all times. This brings us to the classic problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies are employed that leverage the parallelism offered by multi-core architecture for increased effectiveness. Second component is the scheme to make detection information invisible and inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT) circuitry on the system processor. Third component is the use of deception-based recovery scheme to increase the probability of mission survival. So far, a centralized system employing this scheme has been developed. A multi-phase evaluation methodology has also been developed for performance evaluation of this system under realistic operating conditions. Results are found to be promising with low time and performance overhead. Future work involves enhancing this solution for its deployment in a decentralized environment while still maintaining its tamper-resistance and mission survivability properties.