skip to main content
10.1145/1413140.1413154acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Design for survivability: a tradeoff space

Published: 12 May 2008 Publication History

Abstract

When designing a system that has strong reliability, security, or survivability requirements one moves in a trade-off space with a delicate balance between causes and effects that have implications on various objective functions such as cost, performance, availability, analyzability, predictability, or feasibility. The key issues are: 1) given an existing system or application, what are the impacts of adjustments in the fault assumptions, 2) given an existing system or application, what are the impacts of adding or subtracting security features, and 3) given performance, availability, security, or survivability requirements, how can one determine feasibility based on the infrastructure- or application-induced limitations.
This research promotes design for survivability and analyzability to allow for effective assessment of the trade-off space from the view of dynamically changing fault models and the analyzability of a system. It gives pointers to new research directions and presents solutions that aid in making operational decisions or assessing impacts of design decisions.

Supplementary Material

Related slides. (a12-krings-slides.pdf)
Slide presentation for "Design for survivability: a tradeoff space"

References

[1]
A. Avizienis, et. al., Fundamental Concepts of Dependability, Information Survivability Workshop (ISW-2000), Boston, Massachusetts, Oct. 24--26, 2000.
[2]
M. H. Azadmanesh, and R. M. Kieckhafer, Exploiting Omissive Faults in Synchronous Approximate Agreement, IEEE Trans. Computers, 49(10), pp. 1031--1042, Oct. 2000.
[3]
R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. Longstaff and N. R. Mead, Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, November 1997, Revised: May 1999.
[4]
S. Jafar, A. Krings and T. Gautier, Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, IEEE Transactions on Dependable and Secure Computing, (TDSC), in print.
[5]
A. Krings, J-L. Roch, and S. Jafar, Certification of Large Distributed Computations with Task Dependencies in Hostile Environments, IEEE Electro/Information Technology Conference, (EIT 2005), May 22--25, Lincoln, Nebraska, 2005.
[6]
A. Krings, J.-L. Roch, S. Jafar and S. Varrette, A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments, Proc. European Grid Conference (EGC2005), in LNCS 3470, Springer Verlag, February 14--16, Amsterdam, Netherlands, 2005.
[7]
A. Krings, Survivable Systems, Chapter 5 in: Information Assurance: Dependability and Security in Networked Systems. Morgan Kaufmann Publishers, Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy Editors), in press, 2008.
[8]
L. Lamport, et. al., The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, Vol. 4, No. 3, pp. 382--401, July 1982.
[9]
J. C. Laprie, editor, Dependability: Basic Concepts and Terminology, Springer-Verlag, 1992.
[10]
Y. Liu, and K. S. Trivedi, Survivability Quantification: The Analytical Modeling Approach, International Journal of Performability Engineering, Vol. 2, No 1, Jan. 2006, pp. 29--44.
[11]
Z. S. Ma, A. W. Krings, and R. E. Hiromoto, Insect Sensory Systems Inspired Communication and Computing (II): An Engineering Perspective, IEEE-ACM International Conference on Bio-inspired Systems and Signal Processing, (BioSignals 2008), Funchal, Madeira, Portugal, 28--31 January, 2008.
[12]
Z. S. Ma, and A. W. Krings, Survival Analysis Approach to Reliability Analysis and Prognostics and Health Management (PHM), Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.
[13]
Z. S. Ma, and A. W. Krings, Competing Risks Analysis of Reliability, Survivability, and Prognostics and Health Management (PHM), Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.
[14]
Z. S. Ma, and A. W. Krings, Multivariate Survival Analysis (I): Shared Frailty Approaches to Reliability and Dependence Modeling, Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.
[15]
Z. S. Ma, A. W. Krings, and R. E. Hiromoto, Multivariate Survival Analysis (II): An Overview of Multi-State Models in Biomedicine and Engineering Reliability, IEEE International Conference of Biomedical Engineering and Informatics, (BMEI 2008), 27--30 May, Sanya, Hainan, China, 2008.
[16]
Z. S. Ma, and A. W. Krings, Bio-Robustness and Fault Tolerance: A New Perspective on Reliable, Survivable and Evolvable Network Systems, Proc. IEEE AeroSpace Conference, March 1--8, Big Sky, MT, 2008.
[17]
Z. A. Ma, and A. W. Krings, Spatial Distribution Patterns, Power Law, and the Agent-based Directed Diffusion Sensor Networks, Sixth Annual IEEE International Conference on Pervasive Computing and Communications, (PerCom 2008), March 17--21, Hong Kong, 2008.
[18]
Z. S. Ma, and A. W. Krings, Insect Population Inspired Wireless Sensor Networks: A Unified Architecture with Survival Analysis, Evolutionary Game Theory, and Hybrid Fault Models, IEEE International Conference of Biomedical Engineering and Informatics, (BMEI 2008), 27--30 May, Sanya, Hainan, China, 2008.
[19]
N. R. Mead, R. J. Ellison, R. C. Linger, T. Longstaff, and J. McHugh, Survivable Network Analysis Method, Technical Report CMU/SEI-2000-TR-013, Software Engineering Institute, Carnegie Mellon, 2000.
[20]
The PASIS project, Engineering Survivable Storage, Carnegie Mellon University, http://www.pdl.cmu.edu/Pasis/
[21]
L. F. G. Sarmenta, Sabotage-Tolerance Mechanisms for Volunteer Computing Systems, Future Generation Computer Systems, Elsevier Publishing, No. 4, Vol. 18, 2002.
[22]
P. Thambidurai, and Y.-K. Park, Interactive Consistency with Multiple Failure Modes, Proc. 7th Symp. on Reliable Distributed Systems, Columbus, OH, pp. 93--100, Oct. 1988.

Cited By

View all
  • (2013)On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networksProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460011(1-4)Online publication date: 8-Jan-2013
  • (2013)Data Security and Privacy in 2025?10th VLDB Workshop on Secure Data Management - Volume 842510.1007/978-3-319-06811-4_8(37-41)Online publication date: 30-Aug-2013
  • (2012)A prototype for a real-time weather responsive system2012 15th International IEEE Conference on Intelligent Transportation Systems10.1109/ITSC.2012.6338910(1465-1470)Online publication date: Sep-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '08: Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
May 2008
470 pages
ISBN:9781605580982
DOI:10.1145/1413140
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 May 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. design for survivability
  2. fault models
  3. result certification
  4. security
  5. survivability

Qualifiers

  • Research-article

Conference

CSIIRW '08

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networksProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460011(1-4)Online publication date: 8-Jan-2013
  • (2013)Data Security and Privacy in 2025?10th VLDB Workshop on Secure Data Management - Volume 842510.1007/978-3-319-06811-4_8(37-41)Online publication date: 30-Aug-2013
  • (2012)A prototype for a real-time weather responsive system2012 15th International IEEE Conference on Intelligent Transportation Systems10.1109/ITSC.2012.6338910(1465-1470)Online publication date: Sep-2012
  • (2011)A measurement-based design and evaluation methodology for embedded control systemsProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179335(1-1)Online publication date: 12-Oct-2011
  • (2009)Efficient Topic-Based File Sharing in Hybrid Wireless NetworksProceedings of the 42nd Hawaii International Conference on System Sciences10.1109/HICSS.2009.180(1-9)Online publication date: 5-Jan-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media