ECE Graduate Seminar
<p> You are cordially invited to attend the following seminar:</p> <p> </p> <p> </p> <p> Attack Tolerant Cyber Infrastructure</p> <p> By</p> <p> Dr. Bharat Madan</p> <p> Department of Modeling, Simulation and</p> <p> Visualization Engineering</p> <p> Old Dominion University</p> <p> </p> <p> Friday, March 1, 2013</p> <p> 3:00 p.m. KH 224</p> <p> </p> <p> Cyberspace, made up of computers, networks and information systems, has become a crucial element of our nation's critical infrastructure consisting of power grids, petroleum pipelines, health, emergency services, defense, manufacturing, banking, transportation and ports, etc. Pervasive access to high end computers, software tools and wideband networks, coupled with high economic and political rewards to be earned by compromising the security of the cyberspace has made it an attractive target for cyber attackers. Cyber security in turn is made up three primary attributes, Confidentiality, Integrity, and/or Availability. High price of a successful attack on cyber systems that control and manage critical infrastructure systems highlights the need to move beyond just preventing and detecting security intrusions. In order to ensure the survivability of the overlaid critical infrastructure systems, while attack prevention and detection must indeed be the first line of defense, more comprehensive methods of designing inherently attack tolerant cyber systems, to enable these systems to continue providing their services despite successful intrusions. Attack tolerant cyber systems have to meet the requirements of surviving multiple cyber attacks designed to compromise Confidentiality, Integrity, and/or Availability. In this talk, we describe a methodology for architecting cyber systems that are intrinsically survivable. The key innovation that is being researched for achieving attack tolerance is through the use of smart redundancy, which is based on the concept Fragmentation, Coding, Dispersion, and Re-assembly (FCDR). The smart redundancy also has the desirable property of incurring relatively small overhead. In addition, the degree of redundancy and the consequent overhead, can be adjusted to respond to the perceived threat level. The talk will also discuss the need for quantitative security analysis and describes a method to quantify the effects of redundancy on different security attributes.</p>
Posted By: Linda Marshall
Date: Wed Feb 27 12:59:04 EST 2013