Open implementation toolkit for building survivable applications

We consider two aspects of survivability namely survival by adaptation and survival by protection. We show how the quality objects (QuO) distributed adaptive middleware framework enables us to introduce these aspects of survivability in a flexible and systematic manner. We describe a toolkit for developing adaptive applications and demonstrate how more survivable applications can be built using the toolkit.

[1]  William H. Sanders,et al.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA , 1999, Dependable Computing for Critical Applications 7.

[2]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[3]  John McHugh,et al.  Architectural Approaches to Information Survivability , 1997 .

[4]  Douglas C. Schmidt,et al.  The design of the TAO real-time object request broker , 1998, Comput. Commun..

[5]  John A. Zinky,et al.  Specifying and measuring quality of service in distributed object systems , 1998, Proceedings First International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98).

[6]  Shyhtsun Felix Wu,et al.  Architecture Design of a Scalable Intrusion Detection System for the Emerging Network Infrastructure , 1997 .

[7]  John A. Zinky,et al.  PASS-a service for efficient large scale dissemination of time varying data using CORBA , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[8]  John A. Zinky,et al.  An object-level gateway supporting integrated-property quality of service , 1999, Proceedings 2nd IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'99) (Cat. No.99-61702).

[9]  Daniel F. Sterne,et al.  Scalable Access Control for Distributed Object Systems , 1999, USENIX Security Symposium.

[10]  Joseph P. Loyall,et al.  Building Adaptive and Agile Applications Using Intrusion Detection and Response , 2000, NDSS.

[11]  John A. Zinky,et al.  Architectural Support for Quality of Service for CORBA Objects , 1997, Theory Pract. Object Syst..

[12]  Salvatore J. Stolfo,et al.  JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.

[13]  Mustaque Ahamad,et al.  Scalable Consistency Protocols for Distributed Services , 1999, IEEE Trans. Parallel Distributed Syst..

[14]  John A. Zinky,et al.  QoS Aspect Languages and Their Runtime Integration , 1998, LCR.

[15]  Peter G. Neumann,et al.  Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.

[16]  William H. Sanders,et al.  AQuA: an adaptive architecture that provides dependable distributed objects , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[17]  Stephanie Forrest,et al.  Computer immunology , 1997, CACM.

[18]  Karl N. Levitt,et al.  GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .

[19]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.