Skip to main content

Design and Implementation of Survivable Network Systems

  • Conference paper
Advances in Intelligent Computing (ICIC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3645))

Included in the following conference series:

  • 1065 Accesses

Abstract

As their scales and complexities increase, the computer-based network systems suffer from increasing probability of being intruded or crashed and decreasing dependability. Such a problem can be solved by extending the traditional security research to survivability research. This paper concentrates on the design and the implementation of the architecture and the applications of network systems to achieve its survivability. For the architecture, a double-barrier secure structure is constructed, i.e. the outer barrier defends and detects intrusions and the inner one tolerates intrusions and faults. The CORBA-based applications tolerate and detect intrusions and faults and recover from the adverse environment. Then the applications of the network system will be performed successfully despite the intrusions and faults, that is, the survivability of the network system will be achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Neumann, P.G., Hollway, A., Barnes, A.: Survivable Computer-Communication Systems: The Problem and Working Group Recommendations. Technical Report VAL-CE-TR-92- 22 (revision1), U.S. Army Research Laboratory, AMSRL-SL-E, White Sands Missile Range, NM 88002-5513 (May 1993)

    Google Scholar 

  2. Ellison, B., Fisher, D.A., Linger, R.C., et al.: Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University (November 1997)

    Google Scholar 

  3. http://www.microsoft.com/technet/archive/itsolutions/intranet/build/dna2k.mspx

  4. http://java.sun.com/j2ee/overview.html

  5. Object Management Group, Inc. The Common Object Request Broker (CORBA): Architecture and Specification, Y 2.0 (November 1995)

    Google Scholar 

  6. Vinoski, S.: CORBA: Integrating Diverse Applications within Distributed Heterogeneous Environments. IEEE Communications Magazine 35(2), 46–55 (1997)

    Article  Google Scholar 

  7. Vinoski, S.: New Features for CORBA 3.0. Communications of the ACM 41, 44–52 (1998)

    Article  Google Scholar 

  8. Spafford, E.H., Zamboni, D.: Intrusion Detection Using Autonomous Agents. Computer Networks 34(4), 547–570 (2000)

    Article  Google Scholar 

  9. Felber, P., Narasimhan, P.: Experiences, Strategies, and Challenges in Building Fault-Tolerant CORBA Systems. IEEE Trans. Computers 53(5), 497–511 (2004)

    Article  Google Scholar 

  10. Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: The SecureRing Group Communication System. ACM Transactions on Information and System Security 4(4), 371–406 (2001)

    Article  Google Scholar 

  11. Knight, J.C., Sullivan, K.J., Elder, M.C., et al.: Survivable Architectures: Issues and Approaches. In: DARPA Information Survivability Conference and Exposition (January 2000)

    Google Scholar 

  12. Knight, J.C., Heimbigner, D., Wolf, A., et al.: The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications. In: The International Conference on Dependable Systems and Networks (June 2002)

    Google Scholar 

  13. Zhu, J., Ma, J.: Intrusion-Tolerant Based Survivable Model of Database System. Chinese Journal of Electronics (to be appeared)

    Google Scholar 

  14. Narasimhan, P.: Transparent Fault Tolerance for CORBA. PhD thesis, Department of Electrical and Computer Engineering, University of California, Santa Barbara (December 1999)

    Google Scholar 

  15. Narasimhan, P., Kihlstrom, K.P., Moser, L.E., et al.: Providing Support for Survivable CORBA Applications with the Immune System. In: Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, May 1999, pp. 507–516 (1999)

    Google Scholar 

  16. Narasimhan, P., Moser, L.E., Mellar-Smith, P.M.: Strongly Consistent Replication and Recovery of Fault-Tolerant CORBA Applications. Computer System Science and Engineering Journal 17(2), 103–114 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, C., Ma, J., Zhu, J. (2005). Design and Implementation of Survivable Network Systems. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_39

Download citation

  • DOI: https://doi.org/10.1007/11538356_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28227-3

  • Online ISBN: 978-3-540-31907-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics