Search For:

Displaying 1-40 out of 40 total
From Auto-adaptive to Survivable and Self-Regenerative Systems
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal
Issue Date:July 2009
pp. 98-101
This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and user-controlled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusion-tolerance is to provid...
 
A Survey of Security Concepts for Common Operating Environments
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Joseph Loyall, Kurt Rohloff, Partha Pal, Michael Atighetchi
Issue Date:March 2011
pp. 244-253
As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA a...
 
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
Found in: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
By Partha Pal,Michael Atighetchi,Nathaniel Soule,Vatche Ishakian,Joseph Loyall,Robert Grant,Asher Sinclair
Issue Date:June 2014
pp. 141-149
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spi...
 
Efficient Private Publish-Subscribe Systems
Found in: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
By Joud Khoury,Gregory Lauer,Partha Pal,Bishal Thapa,Joseph Loyall
Issue Date:June 2014
pp. 64-71
We address the problem of privacy in publish-subscribe(pub-sub) systems that typically expose some form of published content and subscriber interest, at least to the infrastructure responsible for subscription matching and content delivery. In our recent w...
 
Managed Execution Environment as a Moving-Target Defense Infrastructure
Found in: IEEE Security & Privacy
By Partha Pal,Richard Schantz,Aaron Paulos,Brett Benyo
Issue Date:March 2014
pp. 51-59
The A3 adaptive execution management environment contributes to moving-target defense (MTD) strategies by enabling sophisticated dynamic defensive maneuvers. A3 facilitates synergistic combination of MTDs with one another as well as with other aspects of a...
 
Automated Self-Adaptation for Cyber-Defense -- Pushing Adaptive Perimeter Protection Inward
Found in: 2013 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW)
By Brett Benyo,Partha Pal,Richard Schantz,Aaron Paulos,David J. Musliner,Tom Marble,Jeffrey M. Rye,Michael W. Boldt,Scott Friedman
Issue Date:September 2013
pp. 47-52
This paper presents a recently achieved incremental milestone on the long path toward more intelligently adaptive, automated and self-managed computer systems. We demonstrate the feasibility of integrated cyber-defense connecting anomaly detection and isol...
 
Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment
Found in: 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
By Aaron Paulos,Partha Pal,Richard Schantz,Brett Benyo,David Johnson,Mike Hibler,Eric Eide
Issue Date:September 2013
pp. 82-91
Reliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe, measure and analyze, Input-Reduction, a technique that can quickly isolate ...
 
A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks
Found in: 2012 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW)
By Partha Pal,Richard Schantz,Aaron Paulos,Brett Benyo,David Johnson,Mike Hibler,Eric Eide
Issue Date:September 2012
pp. 15-22
This paper describes an ongoing research effort aiming to use adaptation to defend individual applications against novel attacks. Application focused adaptive security spans adaptive use of security mechanisms in both the host and the network. The work pre...
 
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jing Zhang,Robin Berthier,Will Rhee,Michael Bailey,Partha Pal,Farnam Jahanian,William H. Sanders
Issue Date:June 2012
pp. 1-8
Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at our own institutions reveals tha...
   
5<sup>th</sup> Workshop on recent advances in intrusion-tolerant systems WRAITS 2011
Found in: Dependable Systems and Networks Workshops
By Alysson Besani,Partha Pal
Issue Date:June 2011
pp. 1-2
The 5<sup>th</sup> Workshop on Recent Advances in Intrusion-Tolerant Systems, held in conjunction with DSN 2011, aims to continue the collaborative discourse on the challenges of building intrusion-tolerant systems and innovative ideas to addre...
 
5<sup>th</sup> Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011
Found in: Dependable Systems and Networks, International Conference on
By Alysson Besani,Partha Pal
Issue Date:June 2011
pp. 586-587
The 5<sup>th</sup> Workshop on Recent Advances in Intrusion-Tolerant Systems, held in conjunction with DSN 2011, aims to continue the collaborative discourse on the challenges of building intrusion-tolerant systems and innovative ideas to addre...
 
Continuous mission-oriented assessment (CMA) of assurance
Found in: Dependable Systems and Networks Workshops
By Patrick Hurley,Partha Pal,Mathew Tan Creti,Amy Fedyk
Issue Date:June 2011
pp. 33-38
This paper reports ongoing work on a novel mission-oriented information assurance (IA) assessment approach that contrasts runtime measurements and observations against user-specified requirements.
 
Managed Mission Assurance - Concept, Methodology and Runtime Support
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Partha Pal, Kurt Rohloff, Michael Atighetchi, Rick Schantz
Issue Date:August 2010
pp. 1159-1164
We interpret “mission assurance” to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures and other accidental or maliciously induced changes in the system or its operating env...
 
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy
Found in: IEEE Internet Computing
By Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha Pal, Virginia Travers, John Zinky
Issue Date:May 2011
pp. 43-50
<p>Cost and testing considerations limit the acceptance and deployment of technologies that make information exchanges more secure, reliable, semantically understandable, and self-improving. PbProxy is a flexible proxy that enables transparent insert...
 
Understanding the Vulnerabilities of a SOA Platform - A Case Study
Found in: Network Computing and Applications, IEEE International Symposium on
By Andrew Gronosky, Michael Atighetchi, Partha Pal
Issue Date:July 2010
pp. 182-187
Service-oriented architecture (SOA) is a powerful distributed computing paradigm that provides high-level abstractions for developing, deploying, and executing distributed systems while hiding many platform-level details. SOA platforms host functionality a...
 
Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Partha Pal, Michael Atighetchi, Joseph Loyall, Andrew Gronosky, Charles Payne, Robert Hillman
Issue Date:May 2010
pp. 158-165
As newer software construction paradigms like service-oriented architecture (SOA) are adopted into systems of critical importance, it becomes imperative that technology and design artifacts exist that can be utilized to raise the resiliency and protection ...
 
Attribute-Based Prevention of Phishing Attacks
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal
Issue Date:July 2009
pp. 266-269
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effe...
 
The PhishBouncer Experience
Found in: Conference For Homeland Security, Cybersecurity Applications & Technology
By Partha Pal, Michael Atighetchi
Issue Date:March 2009
pp. 150-154
This extended abstract summarizes the technical results developed under the PhishBouncer project (October 2005 to May 2007), where the authors collaborated with researchers from Symantec Research Lab (SRL). The goal of this project was to develop middlewar...
 
Using a Cognitive Architecture to Automate Cyberdefense Reasoning
Found in: Bio-inspired, Learning, and Intelligent Systems for Security, ECSIS Symposium on
By David Paul Benjamin, Partha Pal, Franklin Webber, Paul Rubel, Mike Atigetchi
Issue Date:August 2008
pp. 58-63
The CSISM project is designing and implementing an automated cyberdefense decision-making mechanism with expert-level ability. CSISM interprets alerts and observations and takes defensive actions to try to ensure the survivability of the computing capabili...
 
Effective Monitoring of a Survivable Distributed Networked Information System
Found in: Availability, Reliability and Security, International Conference on
By Paul Rubel, Michael Atighetchi, Partha Pal, Martin Fong, Richard O'Brien
Issue Date:March 2008
pp. 1306-1312
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS technologies that a very high level of survivability against unconstrained attack...
 
High-Assurance Distributed, Adaptive Software for Dynamic Systems
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Kurt Rohloff, Joseph Loyall, Partha Pal, Richard Schantz
Issue Date:November 2007
pp. 385-386
Exhaustive testing, documentation, code review, and formal methods have been the main approaches for software certification in high confidence cyber-physical systems. Although these methods have been sufficient in the past, continued reliance on these meth...
   
Software Certification for Distributed, Adaptable Medical Systems: Position Paper on Challenges and Paths Forward
Found in: Joint Workshop on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability
By Kurt Rohloff, Richard Schantz, Partha Pal, Joseph Loyall
Issue Date:June 2007
pp. 173-175
Elements of previously vetted architectural constructs, design principles and algorithms, along with static and dynamic analysis, simulation, testing and instrumentation/logging have all historically contributed to certification arguments for safety-critic...
 
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Found in: Network Computing and Applications, IEEE International Symposium on
By Partha Pal, Franklin Webber, Michael Atighetchi, Nate Combs
Issue Date:July 2006
pp. 285-292
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrusted with such data and computation on a continuous basis. In a highly interco...
 
Survivability Architecture of a Mission Critical System: The DPASA Example
Found in: Computer Security Applications Conference, Annual
By Jennifer Chong, Partha Pal, Michael Atigetchi, Paul Rubel, Franklin Webber
Issue Date:December 2005
pp. 495-504
Many techniques and mechanisms exist today, some COTS, others less mature research products that can be used to deflect, detect, or even recover from specific types of cyber attacks. None of them individually is sufficient to provide an all around defense ...
 
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Paul Rubel, Partha Pal, Jennifer Chong, Lyle Sudin
Issue Date:July 2005
pp. 219-222
<p>The same network infrastructure that is essential for the operation of today?s high valued distributed systems can also be misused by malicious attackers. Experience shows that implementing absolute security or preventing cyber attacks completely ...
 
Adaptive Cyberdefense for Survival and Intrusion Tolerance
Found in: IEEE Internet Computing
By Michael Atighetchi, Partha Pal, Franklin Webber, Richard Schantz, Christopher Jones, Joseph Loyall
Issue Date:November 2004
pp. 25-33
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and ...
 
Model-Based Validation of an Intrusion-Tolerant Information System
Found in: Reliable Distributed Systems, IEEE Symposium on
By Fabrice Stevens, Tod Courtney, Sankalp Singh, Adnan Agbaria, John F. Meyer, William H. Sanders, Partha Pal
Issue Date:October 2004
pp. 184-194
An increasing number of computer systems are designed to be distributed across both local and wide-area networks, performing a multitude of critical information-sharing and computational tasks. Malicious attacks on such systems are a growing concern, where...
 
Timeliness in Auto-Adaptive Distributed Systems
Found in: Distributed Computing Systems Workshops, International Conference on
By Partha Pal, Richard E. Schantz, Joseph P. Loyall
Issue Date:March 2004
pp. 354-359
Designers of auto-adaptive systems must devise a way to engage the right response at the right time. In order to bring auto-adaptive capabilities to mainstream distributed systems, it must be ascertained that the adaptation architecture is capable of mount...
 
Survival by Defense-Enabling
Found in: Foundations of Intrusion Tolerant Systems
By Partha Pal, Franklin Webber, Richard Schantz
Issue Date:December 2003
pp. 261
Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. ...
 
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal, Franklin Webber, Christopher Jones
Issue Date:April 2003
pp. 179
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against network-based attacks is a major fo...
 
Packaging Quality of Service Control Behaviors for Reuse
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Richard Schantz, Joseph Loyall, Michael Atighetchi, Partha Pal
Issue Date:May 2002
pp. 0375
Two limitations of the current implementations of adaptive QoS behaviors are complexity associated with inserting them into common application contexts and lack of reusability across applications. What is needed is a way of bundling all the specification f...
 
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications
Found in: Distributed Computing Systems, International Conference on
By Joseph Loyall, Richard Schantz, John Zinky, Partha Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David Karr, Jeanna M. Gossett, Christopher D. Gill
Issue Date:April 2001
pp. 0625
Abstract: The Quality Objects (QuO) middleware is a set of extensions to standard distributed object computing middleware that is used to control and adapt quality of service in a number of distributed application environments, from wide-area to embedded d...
 
Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Partha Pal, Joseph Loyall, Richard Schantz, John Zinky, Rich Shapiro, James Megquier
Issue Date:March 2000
pp. 310
Recent work in opening up distributed object systems to make them suitable for applications needing quality of service control has had the side effect of increasing the complexity in setting up, configuring, and initializing such applications. Configuratio...
 
XML and Quality Objects
Found in: Enabling Technologies, IEEE International Workshops on
By Partha Pal, James Megquier
Issue Date:June 1999
pp. 315
Adapting to desired and available QoS is key to the utility and dependability of distributed, internet-centric applications including those based upon XML. In this paper we explore the possibility of transitioning QuO, which is a technology based on distri...
 
Advanced Adaptive Application (A3) Environment: initial experience
Found in: Proceedings of the Middleware 2011 Industry Track Workshop (Middleware '11)
By Aaron Paulos, John Regehr, Mike Hibler, Partha Pal, Rick Schantz
Issue Date:December 2011
pp. 1-8
In this paper, we describe the prevention-focused and adaptive middleware mechanisms implemented as part of the Advanced Adaptive Applications (A3) Environment that we are developing as a near-application and application-focused cyber-defense technology un...
     
Middleware for runtime assessment of information assurance
Found in: Proceedings of the 11th International Middleware Conference Industrial track (Middleware Industrial Track '10)
By Joe Loyall, Partha Pal, Rick Schantz
Issue Date:November 2010
pp. 23-28
We describe a middleware service and supporting methodology we have developed to facilitate runtime assessment of information assurance (IA) properties. The methodology structures the IA requirements of mission stakeholders along four axes, organizes the m...
     
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management
Found in: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration (SafeConfig '10)
By Azer Bestavros, Jonathan Webb, Joseph Loyall, Michael Atighetchi, Michael J. Mayhew, Partha Pal
Issue Date:October 2010
pp. 83-88
Information exchange across domains is essential for today's asymmetric warfare environment to make mission-critical information available to war fighters, no matter where it exists and when it becomes available. Dissemination of new information needs to c...
     
An abstract interface for cyber-defense mechanisms
Found in: Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead (CSIIRW '08)
By Franklin Webber, Michael Atighetchi, Partha Pal, Paul Rubel
Issue Date:May 2008
pp. N/A
Defending a computer system against malicious attack depends on making many different defense mechanisms work together. In addition to protecting against intrusions, these mechanisms should provide intrusion detection and response. The semantics of input a...
     
Automating cyber-defense management
Found in: Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systems (WRAITS '08)
By Franklin Webber, Michael Atighetchi, Partha Pal, Paul Benjamin, Paul Rubel
Issue Date:April 2008
pp. 1-6
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. That success can largely be attributed to our use of a "survivability architecture", which refers to the organization of a set of concrete defense mechanisms f...
     
Survival by defense-enabling
Found in: Proceedings of the 2001 workshop on New security paradigms (NSPW '01)
By Franklin Webber, Partha Pal, Richard Schantz
Issue Date:September 2001
pp. 71-78
Attack survival, which means the ability to provide some level of service despite an ongoing attack by tolerating its impact, is an important objective of security research. In this paper we present a new approach to survivability and intrusion tolerance. ...
     
 1