Survivability in Network Systems: Seminar Report'03 Survivable Networks Systems
Survivability in Network Systems: Seminar Report'03 Survivable Networks Systems
for 12 hours under normal conditions (or under relatively minor environmental
stress) and deprives its users of essential financial services, the system can
reasonably be judged to have failed its mission, even if data integrity and
confidentiality are preserved.
Our primary focus in this report is to help systems survive the acts of
intelligent adversaries. This bias is based on the nature of the organization to
which the authors belong. Our Survivable Network Technology Team is an
outgrowth of the CERT. Coordination Center, which has been helping users
respond to and recover from computer security incidents since 1988.
In this example, the Web server and its clients make up the system. The
multiple administrative domains are the variety of site domains on the Internet.
Many of these domains have legitimate users. Other sites are used for intrusions
in an anonymous setting. These latter sites cannot be distinguished by their
administrative domain, but only by client behavior. The interoperability between
the server and its clients is defined by http (hypertext transfer protocol), a
convention agreed upon between the server and clients. The system, composed of
Web servers and clients, is widely distributed both geographically and logically
throughout the Internet. Legitimate users and attackers are peers in the
environment and there is no method to isolate legitimate users from the attackers.
In other words, there is no way to bind the environment to legitimate users using
only a common administrative policy.
the parts of the Internet to work together, there is no global administrative control
to assure that these parts behave according to these conventions. Therefore,
security problems abound. Unfortunately, the security problems associated with
unbounded systems are typically underestimated.
There are typically many services that can be temporarily suspended when
a system is dealing with an attack or other extraordinary environmental
condition. Such a suspension can help isolate areas affected by an intrusion and
free system resources to deal with its effects. The overall function of a system
should adapt to preserve essential services.
The experience of the CERT Coordination Center has shown that how
organizations respond to and recover from computer intrusions is at least as
important as the steps they take to prevent them. We believe that widespread
availability and use of survivable systems by the Internet community and
throughout the Internet infrastructure will provide the best hope for the dramatic
improvements necessary to transform the Internet into a survivable, networked
information system of systems. Survivable systems will help make the Internet a
viable medium for the conduct of commerce, defense, and government.
This medium will also enable the support of major elements of the
national infrastructure
(e.g., power grid, public switched network, and air traffic control).
The following five principles (four technical and one organizational) are
example requirements for survivable-system development and testing practices:
• Precisely specify the system’s required functions in all possible
circumstances of system use.
• Verify the correctness of system implementations with respect to the
functional specifications.
Sound engineering practices are required to deal with legacy and COTS
software components as well.
levels of essential services are required, each set of services provided at each
level must also be examined for completeness and coherence. In addition,
requirements must be defined for making the transition to and from essential-
service levels.
Exploration Phase. In this phase, the system has been penetrated and the
intruder is exploring internal system organization and capabilities. By exploring,
the intruder learns how to exploit the access to achieve intrusion objectives.
• There must not be a single point of failure within the network. Essential
services are distributed in a manner that is not critically dependent on any
particular component or node.
• Global knowledge is impossible to achieve in a distributed system. There
are no all-seeing global oracles. Instead, protocols define the interaction
and knowledge shared between nodes.
• Each node must continuously validate the trustworthiness of itself and
those with which it communicates.
• Computations within a given node of an unbounded network, whether for
essential service communication or trust validation, must have costs that
are less than proportional to the number of nodes in the network.
There are many techniques for dealing with these four aspects. Any or all
of the techniques may apply to survivable systems. We do not list all of these
techniques but instead categorize them within the broader aspects. Table 2
contains the four aspects of the survivability solution and representative
taxonomies of respective strategies.
The rapid growth of the Web and other Internet-based applications has
encouraged the growth of a computing infrastructure to support distributed
applications. While the initial Web efforts concentrated on information
publishing, the application domain has expanded to encompass a much wider
spectrum of an organization’s computing needs. a technical focus of this growth
has moved from tools such as Web browsers or servers to the development of a
set of Internet-compatible, commercially provided services. Examples of these
services are file, print, transaction, messaging, directory, security, and object
services such as CORBA (Common Object Request Broker Architecture) and
DCOM (Distributed Component Object Model).
We can draw a number of observations about the questions and issues that
must be addressed concerning system survivability in networked systems.
An open issue is how to determine the basis of trust and how an individual node
of a network contributes to the survivability of the system’s essential services
when
• Any node can be unreliable or rogue
• There is no global view or global control
• Nodes cannot completely trust themselves or their neighbors
Survivability goals are emergent properties that are desired for the systems
as a whole, but do not necessarily prevail for individual nodes of the system. This
approach contrasts with traditional system designs in which specialized functions
or properties are assured for particular nodes and the composition of the system
must ensure that those properties and functional capabilities are preserved for the
system as a whole. For survivability, we must achieve system-wide properties
that typically do not exist in individual nodes. A survivable system must ensure
that desired survivability properties emerge from the interactions among the
components in the construction of reliable systems from unreliable components.
You can design the architecture of the system to maximize the number of
paths between any two nodes; but if enough links are compromised to partition
the network, communication between arbitrary nodes will no longer succeed.
Thus, survivability properties, algorithms, and architectures should be specified,
viewed, and assessed to determine the probability of their success under given
conditions of use and not determined as discrete quantities.
4. RESEARCH DIRECTIONS
5. CONCLUSIONS
6. REFERENCES
• http://survivablenetworktopology.co.in
CONTENTS
4. RESEARCH DIRECTIONS
5. CONCLUSION
6. REFERENCES
ABSTRACT
ACKNOWLEDGEMENTS
Afsar.A.A