Skip to main content

Self-surviving IT Systems

  • Conference paper
Advances in Natural Computation (ICNC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3612))

Included in the following conference series:

  • 2075 Accesses

Abstract

Human social and economic life is becoming increasingly dependent on computers and information technologies. Many important systems such as banking, tax filing, traffic control, and even military functions are now controlled by or receive data feed from computers. Hence, the protection of IT systems from natural and man-made disasters has taken on critical importance. This paper presents a framework for building self-surviving IT systems that can defend themselves against and survive natural and man-made disasters such as earthquake, flood, fire, virus, intrusion, or outright war. The work presented here is a partial result of an ongoing research project called HERMES IT Shield we are conducting at Shanghai Jiao Tong University, China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Special issue on advanced transaction models. Data Engineering 14(1) (March 1991)

    Google Scholar 

  2. Bass, T.: Intrusion detection systems and multi-sensor data fusion. Communication of ACM 43(3), 99–105 (2000)

    Article  Google Scholar 

  3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)

    Google Scholar 

  4. Birman, K.P.: The process group approach to reliable distributed computing. Communications of the ACM 36(12), 37–53 (1993)

    Article  Google Scholar 

  5. Chereque, M., Powell, D., Reynier, P., Richier, J.-L., Voiron, J.: Active replication in delta-4. In: Digest of Papers, 22nd International Symposium on Fault-Tolerant Computing (1992)

    Google Scholar 

  6. Cristian, F., Fetzer, C.: The timed asynchronous distributed system model. In: Proc. Symposium of International Fault-Toleranct Computing (June 1998)

    Google Scholar 

  7. Malan, G.R., Jahanian, F., Watson, D., Smart, M.: Protocol scrubbing: network security through transparent flow modification. IEEE/ACM Transactions on Networks 12(2), 261–273 (2004)

    Article  Google Scholar 

  8. Dolev, D., Malki, D.: The transis approach to high availability cluster communication. Communications of the ACM 39(4), 64–70 (1996)

    Article  Google Scholar 

  9. Elbaum, S., Munson, J.: Intrusion detection through dynamic software measurement. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, pp. 41–50 (1999)

    Google Scholar 

  10. Elmagarmid, A.K. (ed.): Database Transaction Models for Advanced Applications. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  11. Lippmann, R., et al.: Evaluating intrusion detection systems: the 1998 darpa offline intrusion detection evaluation. In: Proceedings of DARPA Information Survivability Conference and Expositions, January 2000, pp. 12–16 (2000)

    Google Scholar 

  12. Jajodia, S., Kerschberg, L. (eds.): Advanced Transaction Models and Architectures. Kluwer Academic Publishers, Dordrecht (1997)

    MATH  Google Scholar 

  13. Jahanian, F., Shin, K.G., Koob, G.: Fault-tolerance in real-time systems. In: Panal Session in the Workshop on Real-Time Operating Systems and Software, Atlanta (May 1991)

    Google Scholar 

  14. Maxion, R., Tan, K.: Benchmarking anomaly-based detection systems. In: Proceedings of the International Conference on Dependable Systems and Networks, New York, NY, pp. 623–630 (2000)

    Google Scholar 

  15. Rajkumar, R., Gagliardi, M., Sha, L.: The real-time publisher/subscriber inter-process communication model for distributed real-time systems: Design and implementation. In: Proc. Real-Time Technology and Applications Symposium, May 1995, pp. 66–75 (1995)

    Google Scholar 

  16. Stallings, W.: Network and inter-network security principles and practice. Prentice Hall, Englewood Cliffs (1995)

    Google Scholar 

  17. Toigo, J.W.: Disaster Recovery Planning. Prentice-Hall, Englewood Cliffs (2002)

    Google Scholar 

  18. Turek, J., Shasha, D.: The many faces of consensus in distributed systems. IEEE Transactions on Computers, 8–17 (June 1992)

    Google Scholar 

  19. Stolfo, S.J., Lee, W., Mok, K.W.: A data mining framework for building intrusion detection models. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 113–119 (1999)

    Google Scholar 

  20. Zhang, Y., Ye, N., Borror, C.: Robustness of the markov-chain model for cyber attack detection. IEEE Trans. Reali. 53(1), 116–123 (2004)

    Article  Google Scholar 

  21. Zou, H.: A priori estimates for a semilinear elliptic system without variational structure and their applications. Mathematische Annalen 323(3), 713–735 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  22. Zou, H.: SRDF for server clusters. Technical White Paper (May 2001)

    Google Scholar 

  23. Zou, H.: Use device/consistency group agent in cluster environment. Technical White Paper (August 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zou, H., Bao, L. (2005). Self-surviving IT Systems. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_126

Download citation

  • DOI: https://doi.org/10.1007/11539902_126

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28320-1

  • Online ISBN: 978-3-540-31863-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics