Abstract
As their scales and complexities increase, the computer-based network systems suffer from increasing probability of being intruded or crashed and decreasing dependability. Such a problem can be solved by extending the traditional security research to survivability research. This paper concentrates on the design and the implementation of the architecture and the applications of network systems to achieve its survivability. For the architecture, a double-barrier secure structure is constructed, i.e. the outer barrier defends and detects intrusions and the inner one tolerates intrusions and faults. The CORBA-based applications tolerate and detect intrusions and faults and recover from the adverse environment. Then the applications of the network system will be performed successfully despite the intrusions and faults, that is, the survivability of the network system will be achieved.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Neumann, P.G., Hollway, A., Barnes, A.: Survivable Computer-Communication Systems: The Problem and Working Group Recommendations. Technical Report VAL-CE-TR-92- 22 (revision1), U.S. Army Research Laboratory, AMSRL-SL-E, White Sands Missile Range, NM 88002-5513 (May 1993)
Ellison, B., Fisher, D.A., Linger, R.C., et al.: Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University (November 1997)
http://www.microsoft.com/technet/archive/itsolutions/intranet/build/dna2k.mspx
Object Management Group, Inc. The Common Object Request Broker (CORBA): Architecture and Specification, Y 2.0 (November 1995)
Vinoski, S.: CORBA: Integrating Diverse Applications within Distributed Heterogeneous Environments. IEEE Communications Magazine 35(2), 46–55 (1997)
Vinoski, S.: New Features for CORBA 3.0. Communications of the ACM 41, 44–52 (1998)
Spafford, E.H., Zamboni, D.: Intrusion Detection Using Autonomous Agents. Computer Networks 34(4), 547–570 (2000)
Felber, P., Narasimhan, P.: Experiences, Strategies, and Challenges in Building Fault-Tolerant CORBA Systems. IEEE Trans. Computers 53(5), 497–511 (2004)
Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: The SecureRing Group Communication System. ACM Transactions on Information and System Security 4(4), 371–406 (2001)
Knight, J.C., Sullivan, K.J., Elder, M.C., et al.: Survivable Architectures: Issues and Approaches. In: DARPA Information Survivability Conference and Exposition (January 2000)
Knight, J.C., Heimbigner, D., Wolf, A., et al.: The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications. In: The International Conference on Dependable Systems and Networks (June 2002)
Zhu, J., Ma, J.: Intrusion-Tolerant Based Survivable Model of Database System. Chinese Journal of Electronics (to be appeared)
Narasimhan, P.: Transparent Fault Tolerance for CORBA. PhD thesis, Department of Electrical and Computer Engineering, University of California, Santa Barbara (December 1999)
Narasimhan, P., Kihlstrom, K.P., Moser, L.E., et al.: Providing Support for Survivable CORBA Applications with the Immune System. In: Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, May 1999, pp. 507–516 (1999)
Narasimhan, P., Moser, L.E., Mellar-Smith, P.M.: Strongly Consistent Replication and Recovery of Fault-Tolerant CORBA Applications. Computer System Science and Engineering Journal 17(2), 103–114 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, C., Ma, J., Zhu, J. (2005). Design and Implementation of Survivable Network Systems. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_39
Download citation
DOI: https://doi.org/10.1007/11538356_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28227-3
Online ISBN: 978-3-540-31907-8
eBook Packages: Computer ScienceComputer Science (R0)