Skip to main content

Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study

  • Conference paper
Grid and Cooperative Computing - GCC 2004 Workshops (GCC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3252))

Included in the following conference series:

  • 566 Accesses

Abstract

In recent years, defense-in-depth information assurance is one of the main focuses in information security research. However, the complexity of information assurance systems increases rapidly with more and more security functions and subsystems being included. In this paper, we propose an autonomic computing architecture for defense-in-depth information assurance systems (DDIAS) so that the increasing complexity of DDIAS can be tackled by distributed autonomous security subsystems with the abilities of self-configuration, self-optimization, self-healing and self-protection. We also present a case study of autonomic computing for distributed emergency response and incident recovery, which is usually the last line of in-depth defense. In the case study, we combine the tenure duty method (TDM) with autonomic system architecture to realize autonomic service roaming and dynamic backup. Experiments show that the proposed method greatly improves the survivability of information systems without much loss of quality of service.

Supported by the National Natural Science Foundation of China Under Grant 60303012, and National High-Technology (863) Program under Grant 2003AA2080.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McHugh, J., Christie, A., Allen, J.: Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software, 42–51 (2000)

    Google Scholar 

  2. Huang, Z.G., Lu, X.C., Wang, H.M.: A Diversified Dynamic Redundancy Method Exploiting the Intrusion Tolerance. In: Proceedings of the Third Information Survivability Workshop (ISW 2000), Boston MA, USA, October 24-26 (2000)

    Google Scholar 

  3. Deep, M., David, T.: Multi-Layered Network Survivability – Models, Analysis, Architecture, Framework and Implementation: An Overview. In: Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000), Hilton Head Island, South Carolina, January 25-27 (2000)

    Google Scholar 

  4. Information Assurance through Defense-in-Depth. Directorate for Command, Control, Communications, and Computer Systems. U.S. Department of Defense Joint Staff (February 2000)

    Google Scholar 

  5. Ganek, A.G., et al.: The Dawning of the Autonomic Computing Era. IBM Systems Journal 42, 5–18 (2003)

    Article  Google Scholar 

  6. Haas, R., Droz, P., Stiller, B.: Autonomic Service Deployment in Networks. IBM Systems Journal 42, 150–164 (2003)

    Article  Google Scholar 

  7. Bantz, D.F., Bisdikian, C., et al.: Autonomic Personal Computing. IBM Systems Journal 42, 165–176 (2003)

    Article  Google Scholar 

  8. Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology, IBM Corporation (2001), available at http://www.research.ibm.com/autonomic/manifesto/autonomic_computing.pdf

  9. Bass, T., Robichaux, R.: Defense-In-Depth Revisited: Qualitative Risk Analysis Methodology for Complex Network-Centric Operations. In: Proc. of IEEE MILCOM 2001, October 28-31, pp. 64–70 (2001)

    Google Scholar 

  10. Huang, Z.G.: The Tenure Duty Method (TDM) in the Active Incident Recovery Research. In: Zhou, X., Xu, M., Jähnichen, S., Cao, J. (eds.) APPT 2003. LNCS, vol. 2834, pp. 557–564. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, X., Huang, Z., Xuan, L. (2004). Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004 Workshops. GCC 2004. Lecture Notes in Computer Science, vol 3252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30207-0_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30207-0_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23578-1

  • Online ISBN: 978-3-540-30207-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics