Home | Projects | Publications | Presentations | People | News | Activities | About DCSL | Internal |
1. Distributed Intrusion Tolerant System Design | |
As distributed systems are deployed for running critical applications, there is an increasing need to make such systems resilient. The distributed applications running on such platforms need continuous uptime, as downtime translates directly to financial losses, loss of prestige, or endangerment of human lives. Examples of such applications abound in the domains of banking, finance, airline, and military. The systems need to be resilient to faults as we traditionally know them, having non-malicious origin, as well as to intrusions or faults created by malicious human attackers of the system. The ultimate outcome of both faults and intrusions is to cause a failure of the system or its performance degradation. However, until now, the two causes of system disruptions have been looked upon as separate areas of concern, each with its own methodology and sub-system. This increases the complexity of the overall system and does not exploit the synergy between the two tasks – providing fault-tolerance and intrusion-tolerance – and therefore increases the overall cost of achieving both. In this proposal, we argue for a common approach to handling faults and intrusions, henceforth called disruptions. There is also the need for an integrated infrastructure that provides tolerance to disruptions, not piecemeal solutions such as detection alone. The different phases of disruption tolerance considered here – detection, diagnosis, containment and recovery – are closely coupled in their functioning and the project provides a framework for exploring the interactions to make the system as a whole resilient to disruptions. The project uses best-of-breed techniques from several areas of fault tolerance and intrusion tolerance that have been researched for long, such as network based intrusion detection tools and available database of vulnerabilities in widely used software. The current problems we are working on are:
Collaborators: Alumni: Yu-Sung Wu, Bingrui Foo, Matthew Glause. Details: Click for a more detailed discussion of the rationale and our solution approach. Posters: v-CAPS: A Confidential and Anonymous Routing Protocol for Content-Based Publish-Subscribe Networks Papers: See publications. |
|
2. Intelligent Ad-Hoc Wireless Networks | |
Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, miniature sensor nodes. These nodes are multifunctional and capable of sensing, communication, computation and sometimes, mobility. Sensor networks are comprised of large numbers of sensor nodes placed in the environment to be monitored and communicating with each other through low-bandwidth communication links. Some of the characteristics of the sensor nodes make it challenging to harness them into usable networks. They have limited sources of power, high failure rates and limited computation and communication power. In our current research, we are investigating the issues in building sensor networks to meet high-level application requirements, such as time to completion, in the face of the constraints imposed by the nodes. Specifically, our research focuses on scheduling algorithms for communication, computation and mobility taking deployment specific knowledge into account. While the individual nodes may be prone to failures, a certain fraction of redundant nodes may be deployed. We intend to investigate protocols that exploit the redundancy in the sensor nodes to “route around” failures. Another area of focus is the design of power-aware routing protocols and integrating them with higher-level protocols controlling computation, communication and motion. In this research, we will address fundamental problems leading to proof of concept demonstrations of the developed strategies and technologies through a testbed of mobile sensor nodes running a network protocol stack, middleware and representative applications.
Collaborators: Prior Collaborators: Alumni: Posters: Secure Information Exchange in Vehicular and Power Grid Networks Papers: See publications. |
|
3. Self-Checking Techniques for Distributed Protocols | |
Networked devices running software service protocols are playing an increasingly important role in the connected world of today. Given the increase in complexity and scale of these services and the fact that networks are primarily running on software architectures designed in the 1980s, we are seeing cases of spectacular failures of network services today and believe tomorrow's services are not positioned for the continuous availability that will be needed of them. The approach we are studying for detecting a class of failures due to software defects, mis-configurations or malicious attacks employs an external monitor component. The monitor observes the interactions between the protocol participants and performs predictive or reactive detection of failures. It is important the monitor be resilient, scalable and non-intrusive to the original software. The coverage of the monitor has to be validated through failure injection to the system that mimic the real-world scenarios. Grid reliability: In a related project, we are building reliable protocols for a shared grid-like environment. In this environment applications can execute on shared compute nodes and be migrated off transparently when it starts competing for resources with the processes belonging to the owner of that node. To deal with such migrations and failures, we have a checkpointing solution where the checkpoints can be stored on shared storage nodes, rather than on dedicated nodes. The project is aimed at enabling reliable execution of applications in a fundamentally dynamic and unreliable environment.
Past Collaborators: Alumni: Details: Click here for a more detailed discussion of the rationale and our solution approach for the Monitor project. Click here for a detailed description of our project on characterization of failures in web services. Papers: See publications. |
465 Northwestern Avenue, West Lafayette, IN 47907 | dcsl@ecn.purdue.edu | +1 765 494 3510 |
Home | Projects | Publications | Presentations | People News | Activities | About DCSL | Internal Last Update: June 30, 2014 12:42 by GMHoward |