DocumentCode
593752
Title
CyberX: A biologically-inspired platform for cyber trust management
Author
Azab, Mohamed ; Eltoweissy, Mohamed
Author_Institution
Bradley Dept. of Electr., & Comput. Eng., Virginia Tech, Blacksburg, VA, USA
fYear
2012
fDate
14-17 Oct. 2012
Firstpage
655
Lastpage
663
Abstract
Today numerous infrastructure assets remain alarmingly susceptible to advanced, targeted cyber attacks. There is a need to construct trustworthy high-quality protection and defense solutions capable of securing such valuable assets. In our work, we realize such cyber trust through trace-resistant moving-target defense, resilience against failures and attacks, and autonomous trustworthy cooperative defense. Achieving these goals would require software development, management, and operation platforms that support elasticity, diversity, awareness, cooperation, and intelligence. In this paper, we propose CyberX, a situation-aware trustworthy management platform. CyberX utilizes our Cell Oriented Architecture (COA) capability that separates the main design concerns: data, logic and physical resources to employ runtime diversity via hot shuffling of similar-function different-quality-objective code variants. CyberX employs such diversity to modify the application implicit behavior at runtime utilizing autonomous execution elasticity and adaptability. Further, CyberX enhances application resilience against failures and attacks via multi-mode recovery and real-time, context- and situation-aware adjustment of shuffling and recovery policies. Using analysis and simulation, results show that CyberX-managed COA-based software systems can efficiently adapt to maintain the desired performance and resilience objectives even in hazardous, unstable environments at a reasonable overhead.
Keywords
security of data; software engineering; trusted computing; CyberX-managed COA-based software systems; application resilience; autonomous trustworthy cooperative defense; biologically-inspired platform; cell oriented architecture; cyber attacks; cyber trust management; different-quality-objective code variants; hot shuffling; infrastructure assets; situation-aware trustworthy management platform; software development; trace-resistant moving target defense; Adaptation models; Biological system modeling; Cryptography; Reliability; Resilience; Runtime; biologically-inspired software architecture; hot shuffling; moving target defense; resilience; software management platform; system diversity;
fLanguage
English
Publisher
ieee
Conference_Titel
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th International Conference on
Conference_Location
Pittsburgh, PA
Print_ISBN
978-1-4673-2740-4
Type
conf
Filename
6450965
Link To Document