Autonomic Approach to Survivable Cyber-Secure Infrastructures

Information systems now form the backbone of nearly every government and private system – Web services currently does or will play a major role in supporting access to distributed resources, command and control to exploit the backbone. Increasingly these systems are networked together allowing for distributed operations, sharing of databases, and redundant capability. Ensuring these networks are secure, robust, and reliable is critical for the strategic and economic well being of the Nation. This paper argues in favor of a biologically inspired approach to creating survivable cyber-secure infrastructures (SCI). Our discussion employs the power transmission grid. Keywords Infrastructure Vulnerability, Reliability, Cyber-Security, Software Agent, Autonomic Computing Paradigm

[1]  Axel W. Krings,et al.  A graph based model for survivability applications , 2005, Eur. J. Oper. Res..

[2]  Frederick T. Sheldon,et al.  Testing Software Requirements with Z and Statecharts Applied to an Embedded Control Systemt0t1 , 2004, Software Quality Journal.

[3]  Thomas E. Potok,et al.  ENERGY INFRASTRUCTURE SURVIVABILITY, INHERENT LIMITATIONS, OBSTACLES AND MITIGATION STRATEGIES , 2003 .

[4]  Frederick T. Sheldon,et al.  Metrics for maintainability of class inheritance hierarchies , 2002, J. Softw. Maintenance Res. Pract..

[5]  Stefan Greiner,et al.  Specification, safety and reliability analysis using stochastic Petri net models , 2000, Tenth International Workshop on Software Specification and Design. IWSSD-10 2000.

[6]  Jim Alves-Foss,et al.  Risk Analysis and Probabilistic Survivability Assessment ( RAPSA ) : An Assessment Approach for Power Substation Hardening , 2002 .

[7]  N. Hanebutte,et al.  Considering Attack Complexity : Layered Intrusion Tolerance , .

[8]  Axel W. Krings,et al.  Scheduling Issues In Survivability Applications Using Hybrid Fault Models , 2004, Parallel Process. Lett..

[9]  Michael R. Fellows,et al.  Kernelization Algorithms for the Vertex Cover Problem: Theory and Experiments , 2004, ALENEX/ANALC.

[10]  Thomas E. Potok,et al.  Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks , 2003, ISCA PDCS.

[11]  Thomas E. Potok,et al.  VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment , 2003 .

[12]  Jim Alves-Foss,et al.  Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack , 2002 .

[13]  N. Hanebutte,et al.  Low-Level Network Attack Recognition : A Signature-Based Approach ∗ , 2001 .

[14]  Axel W. Krings,et al.  Agent survivability: an application for strong and weak chain constrained scheduling , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[15]  Axel W. Krings,et al.  Secure and survivable software systems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[16]  Frederick T. Sheldon,et al.  Validation of guidance control software requirements specification for reliability and fault-tolerance , 2002, Annual Reliability and Maintainability Symposium. 2002 Proceedings (Cat. No.02CH37318).

[17]  Faisal N. Abu-Khzam,et al.  Scalable parallel algorithms for difficult combinatorial problems: A case study in optimization , 2004, Parallel and Distributed Computing and Networks.

[18]  Anand S. Rao,et al.  BDI Agents: From Theory to Practice , 1995, ICMAS.

[19]  Axel W. Krings,et al.  A simple GSPN for modelling common mode failures in critical infrastructures , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[20]  T. Potok,et al.  CRITICAL ENERGY INFRASTRUCTURE SURVIVABILITY , INHERENT LIMITATIONS , 2004 .

[21]  Thomas E. Potok,et al.  An ontology-based software agent system case study , 2003, Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing.

[22]  Michael Wooldridge,et al.  Agent-based software engineering , 1997, IEE Proc. Softw. Eng..

[23]  Axel W. Krings,et al.  On the performance of a survivability architecture for networked computing systems , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[24]  Frederick T. Sheldon,et al.  Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems , 2004, SAC '04.

[25]  Stefano Chessa,et al.  Comparison-based system-level fault diagnosis in ad hoc networks , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[26]  Stefan Greiner,et al.  Composing, analyzing and validating software models to assess the performability of competing design candidates , 1999, Ann. Softw. Eng..

[27]  Stefan Greiner,et al.  Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System , 2002, ESM.

[28]  GERNOT METZE,et al.  On the Connection Assignment Problem of Diagnosable Systems , 1967, IEEE Trans. Electron. Comput..

[29]  Michael R. Fellows,et al.  Parameterized Complexity , 1998 .

[30]  Frederick T. Sheldon,et al.  Modeling with Stochastic Message Sequence Charts , 2003 .

[31]  Krishna M. Kavi,et al.  Reliability measurement: from theory to practice , 1992, IEEE Software.

[32]  Axel W. Krings,et al.  Assessing Power Substation Network Security and Survivability: A Work in Progress Report , 2003, Security and Management.

[33]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.