Abstract
Human social and economic life is becoming increasingly dependent on computers and information technologies. Many important systems such as banking, tax filing, traffic control, and even military functions are now controlled by or receive data feed from computers. Hence, the protection of IT systems from natural and man-made disasters has taken on critical importance. This paper presents a framework for building self-surviving IT systems that can defend themselves against and survive natural and man-made disasters such as earthquake, flood, fire, virus, intrusion, or outright war. The work presented here is a partial result of an ongoing research project called HERMES IT Shield we are conducting at Shanghai Jiao Tong University, China.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Special issue on advanced transaction models. Data Engineering 14(1) (March 1991)
Bass, T.: Intrusion detection systems and multi-sensor data fusion. Communication of ACM 43(3), 99–105 (2000)
Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)
Birman, K.P.: The process group approach to reliable distributed computing. Communications of the ACM 36(12), 37–53 (1993)
Chereque, M., Powell, D., Reynier, P., Richier, J.-L., Voiron, J.: Active replication in delta-4. In: Digest of Papers, 22nd International Symposium on Fault-Tolerant Computing (1992)
Cristian, F., Fetzer, C.: The timed asynchronous distributed system model. In: Proc. Symposium of International Fault-Toleranct Computing (June 1998)
Malan, G.R., Jahanian, F., Watson, D., Smart, M.: Protocol scrubbing: network security through transparent flow modification. IEEE/ACM Transactions on Networks 12(2), 261–273 (2004)
Dolev, D., Malki, D.: The transis approach to high availability cluster communication. Communications of the ACM 39(4), 64–70 (1996)
Elbaum, S., Munson, J.: Intrusion detection through dynamic software measurement. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, pp. 41–50 (1999)
Elmagarmid, A.K. (ed.): Database Transaction Models for Advanced Applications. Morgan Kaufmann, San Francisco (1993)
Lippmann, R., et al.: Evaluating intrusion detection systems: the 1998 darpa offline intrusion detection evaluation. In: Proceedings of DARPA Information Survivability Conference and Expositions, January 2000, pp. 12–16 (2000)
Jajodia, S., Kerschberg, L. (eds.): Advanced Transaction Models and Architectures. Kluwer Academic Publishers, Dordrecht (1997)
Jahanian, F., Shin, K.G., Koob, G.: Fault-tolerance in real-time systems. In: Panal Session in the Workshop on Real-Time Operating Systems and Software, Atlanta (May 1991)
Maxion, R., Tan, K.: Benchmarking anomaly-based detection systems. In: Proceedings of the International Conference on Dependable Systems and Networks, New York, NY, pp. 623–630 (2000)
Rajkumar, R., Gagliardi, M., Sha, L.: The real-time publisher/subscriber inter-process communication model for distributed real-time systems: Design and implementation. In: Proc. Real-Time Technology and Applications Symposium, May 1995, pp. 66–75 (1995)
Stallings, W.: Network and inter-network security principles and practice. Prentice Hall, Englewood Cliffs (1995)
Toigo, J.W.: Disaster Recovery Planning. Prentice-Hall, Englewood Cliffs (2002)
Turek, J., Shasha, D.: The many faces of consensus in distributed systems. IEEE Transactions on Computers, 8–17 (June 1992)
Stolfo, S.J., Lee, W., Mok, K.W.: A data mining framework for building intrusion detection models. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 113–119 (1999)
Zhang, Y., Ye, N., Borror, C.: Robustness of the markov-chain model for cyber attack detection. IEEE Trans. Reali. 53(1), 116–123 (2004)
Zou, H.: A priori estimates for a semilinear elliptic system without variational structure and their applications. Mathematische Annalen 323(3), 713–735 (2002)
Zou, H.: SRDF for server clusters. Technical White Paper (May 2001)
Zou, H.: Use device/consistency group agent in cluster environment. Technical White Paper (August 2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zou, H., Bao, L. (2005). Self-surviving IT Systems. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_126
Download citation
DOI: https://doi.org/10.1007/11539902_126
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28320-1
Online ISBN: 978-3-540-31863-7
eBook Packages: Computer ScienceComputer Science (R0)