• DocumentCode
    377005
  • Title

    Defense-enabling using advanced middleware-an example

  • Author

    Pal, Partha P. ; Webber, Franklin ; Schantz, Richard E. ; Atighetchi, Michael ; Loyall, Joseph P.

  • Author_Institution
    BBN Technol., Cambridge, MA, USA
  • Volume
    1
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    92
  • Abstract
    Many intrusions into computer systems target specific applications with an intent; to stop them from functioning properly. The traditional security engineering approach attempts to secure the infrastructure: the hardware, the network and operating system, with the goal of preventing such attacks getting through to any application running on these platforms. We propose a. complementary approach that aims to ensure the applications´ continued ability to provide useful service despite the ongoing attack(s). This approach, called defense-enabling, uses an adaptive middleware to coordinate services of multiple mechanisms that are not normally part of the application´s functional objectives. Defense-enabling an application involves focusing on a set of attacks, developing a strategy to defend against these attacks and systematically incorporating the strategy in the application. The topic of this paper is the technology underlying the concept. We show how services of various mechanisms, organized and coordinated by an adaptive middleware, support the implementation of an application´s defense strategy. We believe that the increased resilience obtained by defense-enabling would be significant for critical military applications.
  • Keywords
    adaptive systems; distributed object management; military communication; military computing; network operating systems; security of data; telecommunication security; CORBA; adaptive middleware; attacks; computer systems intrusion; defense-enabling concept; distributed applications; distributed object computing; hardware security; military applications; network security; operating system; security engineering; Application software; Contracts; Filtering; Hardware; Intrusion detection; Middleware; Operating systems; Resilience; Security; Technology management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
  • Print_ISBN
    0-7803-7225-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.2001.985770
  • Filename
    985770