AWDRAT: A Cognitive Middleware System for Information Survivability.

by Howard E. Shrobe, Robert Laddaga, Robert Balzer, Neil M. Goldman, David S. Wile, Marcelo Tallis, Tim Hollebeek, Alexander Egyed
Abstract:
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by �recreational hackers� have already led to severe disruptions and significant cost. It, therefore, is critical that we find ways to protect such systems and to enable them to continue functioning even after a successful attack. This paper describes AWDRAT, a middleware system for providing survivability to both new and legacy applications. AWDRAT stands for Architectural-differencing, Wrappers, Diagnosis, Recovery, Adaptive software, and Trust-modeling. AWDRAT uses these techniques to gain visibility into the execution of an application system and to compare the application’s actual behavior to that which is expected. In the case of a deviation, AWDRAT conducts a diagnosis that figures out which computational resources are likely to have been compromised and then adds these assessments to its trust-model. The trust model in turn guides the recovery process, particularly by guiding the system in its choice among functionally equivalent methods and resources. AWDRAT has been used on an example application system, a graphical editor for constructing mission plans. We present data showing the effectiveness of AWDRAT in detecting a variety of compromises to the application system.
Reference:
Howard E. Shrobe, Robert Laddaga, Robert Balzer, Neil M. Goldman, David S. Wile, Marcelo Tallis, Tim Hollebeek, Alexander Egyed, "AWDRAT: A Cognitive Middleware System for Information Survivability.", In AI Magazine, vol. 28, no. 3, pp. 73-91, 2007.
Bibtex Entry:
@Article{dblp:journals/aim/ShrobeLBGWTHE07,
  Title                    = {AWDRAT: A Cognitive Middleware System for Information Survivability.},
  Author                   = {Howard E. Shrobe and Robert Laddaga and Robert Balzer and Neil M. Goldman and David S. Wile and Marcelo Tallis and Tim Hollebeek and Alexander Egyed},
  Journal                  = {AI Magazine},
  Year                     = {2007},
  Number                   = {3},
  Pages                    = {73-91},
  Volume                   = {28},

  Abstract                 = {The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by �recreational hackers� have already led to severe disruptions and significant cost. It, therefore, is critical that we find ways to protect such systems and to enable them to continue functioning even after a successful attack. This paper describes AWDRAT, a middleware system for providing survivability to both new and legacy applications. AWDRAT stands for Architectural-differencing, Wrappers, Diagnosis, Recovery, Adaptive software, and Trust-modeling. AWDRAT uses these techniques to gain visibility into the execution of an application system and to compare the application’s actual behavior to that which is expected. In the case of a deviation, AWDRAT conducts a diagnosis that figures out which computational resources are likely to have been compromised and then adds these assessments to its trust-model. The trust model in turn guides the recovery process, particularly by guiding the system in its choice among functionally equivalent methods and resources. AWDRAT has been used on an example application system, a graphical editor for constructing mission plans. We present data showing the effectiveness of AWDRAT in detecting a variety of compromises to the application system.},
  File                     = {AWDRAT - A Cognitive Middleware System for Information Survivability:Conferences\\AAAI 2006 - AWDRAT - A Cognitive Middleware System for Information Survivability\\AWDRAT - A Cognitive Middleware System for Information Survivability.pdf:PDF},
  Keywords                 = {selfaware, execution},
  Url                      = {http://www.aaai.org/ojs/index.php/aimagazine/article/view/2056}
}
Powered by bibtexbrowser