[ skip to content ]

More Information about this image

Aerial shot of campus showing Kaufman Mall, Webb Center and the quad in the background

ECE Graduate Seminar

<p> &nbsp;You are cordially invited to attend the following seminar:</p> <p> &nbsp;</p> <p> &nbsp;</p> <p> Attack Tolerant Cyber Infrastructure</p> <p> By</p> <p> Dr. Bharat Madan</p> <p> Department of Modeling, Simulation and</p> <p> Visualization Engineering</p> <p> Old Dominion University</p> <p> &nbsp;</p> <p> Friday, March 1,&nbsp; 2013</p> <p> 3:00 p.m. &nbsp;KH 224</p> <p> &nbsp;</p> <p> Cyberspace, made up of computers, networks and information systems, has become a crucial element of our nation&#39;s critical infrastructure consisting of power grids, petroleum pipelines, health, emergency services, defense, manufacturing, banking, transportation and ports, etc. Pervasive access to high end computers, software tools and wideband networks, coupled with high economic and political rewards to be earned by compromising the security of the cyberspace has made it an attractive target for cyber attackers. Cyber security in turn is made up three primary attributes, Confidentiality, Integrity, and/or Availability. High price of a successful attack on cyber systems that control and manage critical infrastructure systems highlights the need to move beyond just preventing and detecting security intrusions. In order to ensure the survivability of the overlaid critical infrastructure systems, while attack prevention and detection must indeed be the first line of defense, more comprehensive methods of designing inherently attack tolerant cyber systems, to enable these systems to continue providing their services despite successful intrusions. Attack tolerant cyber systems have to meet the requirements of surviving multiple cyber attacks designed to compromise Confidentiality, Integrity, and/or Availability. In this talk, we describe a methodology for architecting cyber systems that are intrinsically survivable. The key innovation that is being researched for achieving attack tolerance is through the use of smart redundancy, which is based on the concept Fragmentation, Coding, Dispersion, and Re-assembly (FCDR). The smart redundancy also has the desirable property of incurring relatively small overhead. In addition, the degree of redundancy and the consequent overhead, can be adjusted to respond to the perceived threat level. The talk will also discuss the need for quantitative security analysis and describes a method to quantify the effects of redundancy on different security attributes.</p>

Posted By: Linda Marshall
Date: Wed Feb 27 12:59:04 EST 2013

Site Navigation

Experience Guaranteed

Enhance your college career by gaining relevant experience with the skills and knowledge needed for your future career. Discover our experiential learning opportunities.

Academic Days

Picture yourself in the classroom, speak with professors in your major, and meet current students.

Upcoming Events

From sports games to concerts and lectures, join the ODU community at a variety of campus events.