Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems: In Association With 10th ACM Conference on Co 2003
DOI: 10.1145/1036921.1036923
|View full text |Cite
|
Sign up to set email alerts
|

A holistic approach to service survivability

Abstract: We present SABER (Survivability Architecture: Block, Evade, React), a proposed survivability architecture that blocks, evades and reacts to a variety of attacks by using several security and survivability mechanisms in an automated and coordinated fashion.Contrary to the ad hoc manner in which contemporary survivable systems are built-using isolated, independent security mechanisms such as firewalls, intrusion detection systems and software sandboxes-SABER integrates several different technologies in an attemp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2003
2003
2017
2017

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 52 publications
0
14
0
2
Order By: Relevance
“…It is also involve in the movement of core services program to different platform and freezing where the computation was ceased on the newer platform. For various critical safety systems, migration is known as the heart of the structural design of software [9]. Migration is considered an important strategy for system survivability service.…”
Section: B Different Concepts Related To Migration Used By Differentmentioning
confidence: 99%
“…It is also involve in the movement of core services program to different platform and freezing where the computation was ceased on the newer platform. For various critical safety systems, migration is known as the heart of the structural design of software [9]. Migration is considered an important strategy for system survivability service.…”
Section: B Different Concepts Related To Migration Used By Differentmentioning
confidence: 99%
“…Effectors must be capable of tuning the target system via its exposed configuration parameters. They may also perform partial replacements by initiating and retiring system components, invoke special utilities such as process migration [20] and, in general, carry out nearly any feasible form of adaptation to individual components and connectors of the running system permitted by that target system. Effectors are necessarily more tightly coupled to the target system than the rest of the reference architecture.…”
Section: Modelmentioning
confidence: 99%
“…We are also considering a wider range of application domains. One particularly intriguing application area is autonomic service survivability in the face of insider and outsider security attacks, to coordinate what would otherwise be isolated, independently operating security mechanisms, as we propose in [20].…”
Section: Conclusion Limitations and Future Workmentioning
confidence: 99%
“…The VFS objects of each entity (file or directory) are duplicated at the Wrapfs level. On Linux, many file systems have been derived from Wrapfs, including ones for encryption [Corner and Noble 2002;Halcrow 2004;Shanahan 2000], intrusion detection [Keromytis et al 2003], integrity checking , LISA], unification [Klotzbücher 2004;Wright et al 2006], tracing [Aranya et al 2004], versioning , replication [Tzachar 2003], compression Indra Networks 2004], RAID-like functionality [Joukov et al 2005], migration [Schaefer 2000], and more.…”
Section: Layering In Modern Unix Systemsmentioning
confidence: 99%