DocumentCode
377005
Title
Defense-enabling using advanced middleware-an example
Author
Pal, Partha P. ; Webber, Franklin ; Schantz, Richard E. ; Atighetchi, Michael ; Loyall, Joseph P.
Author_Institution
BBN Technol., Cambridge, MA, USA
Volume
1
fYear
2001
fDate
2001
Firstpage
92
Abstract
Many intrusions into computer systems target specific applications with an intent; to stop them from functioning properly. The traditional security engineering approach attempts to secure the infrastructure: the hardware, the network and operating system, with the goal of preventing such attacks getting through to any application running on these platforms. We propose a. complementary approach that aims to ensure the applications´ continued ability to provide useful service despite the ongoing attack(s). This approach, called defense-enabling, uses an adaptive middleware to coordinate services of multiple mechanisms that are not normally part of the application´s functional objectives. Defense-enabling an application involves focusing on a set of attacks, developing a strategy to defend against these attacks and systematically incorporating the strategy in the application. The topic of this paper is the technology underlying the concept. We show how services of various mechanisms, organized and coordinated by an adaptive middleware, support the implementation of an application´s defense strategy. We believe that the increased resilience obtained by defense-enabling would be significant for critical military applications.
Keywords
adaptive systems; distributed object management; military communication; military computing; network operating systems; security of data; telecommunication security; CORBA; adaptive middleware; attacks; computer systems intrusion; defense-enabling concept; distributed applications; distributed object computing; hardware security; military applications; network security; operating system; security engineering; Application software; Contracts; Filtering; Hardware; Intrusion detection; Middleware; Operating systems; Resilience; Security; Technology management;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
Print_ISBN
0-7803-7225-5
Type
conf
DOI
10.1109/MILCOM.2001.985770
Filename
985770
Link To Document