Skip to main content

Organic Resilience for Tactical Environments

  • Conference paper
Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS 2010)

Abstract

In this paper we present a tactical defense infrastructure for mission survivability based on three core inspirations from biological systems: multi-potentiation, feedback mechanisms, and redundancy. In tactical operational environments, these concepts may be realized through a combination of capabilities that include (1) dynamic allocation of resources for mission execution, (2) detection and identification of attacks and their effects, and (3) information sharing for system adaptation. As a proof-of-concept we introduce an extensible, multi-layer defense infrastructure inspired in the self-organization and resilience properties of biological systems. Two defense strategies are considered to validate the proposed model: a fast response consisting on rebooting a compromised system from a reference system image; and a slower response involving a process of identification of the attack, which then allows the node to change its base configuration and reboot to a state that is potentially immune to the same attack. Our experimental results show that the second strategy improves the overall resilience of the system for ongoing attacks after an initial exposure phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Muller-Schloer, C.: “Organic computing” on the feasibility of controlled emergence. In: CODES+ISSS 2004: Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, pp. 2–5. IEEE Computer Society, Washington, DC (2004)

    Google Scholar 

  2. Carvalho, M.: Security in mobile ad hoc networks. IEEE Security and Privacy 6(2), 72–75 (2008)

    Article  Google Scholar 

  3. Wong, P.Y., Gibbons, J.: A process semantics for BPMN. Draft (2007)

    Google Scholar 

  4. Carvalho, M., Winkler, R., Perez, C., Kovach, J., Choy, S.: A cross-layer predictive routing protocol for mobile ad hoc networks. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, ser. Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, vol. 6981 (May 2008)

    Google Scholar 

  5. Agrawal, P., Ghosh, R.K., Das, S.K.: Cooperative black and gray hole attacks in mobile ad hoc networks. In: ICUIMC 2008: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 310–314. ACM, New York (2008)

    Google Scholar 

  6. Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of service attacks at the mac layer in wireless ad hoc networks (2002)

    Google Scholar 

  7. Zhou, Y., Wu, D., Nettles, S.M.: On mac-layer denial of service attacks in ieee 802.11 ad hoc networks: analysis and counter measures. Int. J. Wire. Mob. Comput. 1(3/4), 268–275 (2006)

    Article  Google Scholar 

  8. Lardieri, P., Balasubramanian, J., Schmidt, D.C., Thaker, G., Gokhale, A., Damiano, T.: A multi-layered resource management framework for dynamic resource management in enterprise dre systems. J. Syst. Softw. 80(7), 984–996 (2007)

    Article  Google Scholar 

  9. Carvalho, M., Pěchouček, M., Suri, N.: A Mobile Agent-Based Middleware for Opportunistic Resource Allocation and Communications. In: Thompson, S.G., Ghanea-Hercock, R. (eds.) DAMAS 2005. LNCS (LNAI), vol. 3890, pp. 121–134. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the impact of cyber attacks on missions. In: 5th International Conference on Information Warfare and Security, April 8-9, pp. 446–456. Air Force Institute of Technology, Wright-Patterson AFB (2010)

    Google Scholar 

  11. Carvalho, M.: A distributed reinforcement learning approach to mission survivability in tactical manets. In: CSIIRW 2009: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1–4. ACM, New York (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Carvalho, M., Lamkin, T., Perez, C. (2012). Organic Resilience for Tactical Environments. In: Suzuki, J., Nakano, T. (eds) Bio-Inspired Models of Network, Information, and Computing Systems. BIONETICS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32615-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32615-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32614-1

  • Online ISBN: 978-3-642-32615-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics