CT-ISG: Towards Trusted Adaptation Dynamics in Computing Systems and Networks
CT-ISG:迈向计算系统和网络中的可信适应动态
基本信息
- 批准号:0524477
- 负责人:
- 金额:$ 30万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2005
- 资助国家:美国
- 起止时间:2005-10-01 至 2009-09-30
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
This proposal aims to study (and develop appropriate defenses against) emerging exploits that target the "dynamics" of a system's operation---dynamics that result from the adaptation strategies deployed in most computing systems and networks. While few instances of adversarial exploits along these lines have been identified recently---namely, the PIs work on Reduction of Quality (RoQ) attacks on admission controllers of end-hosts and on TCP adaptation in networks---little is known about the significance, prevalence, and other-than-adversarial motives of such exploits, not to mention effective defenses. INTELLECTUAL MERITS: The work to be pursued as part of this proposal flows along three dimensions: (1) vulnerability assessment, (2) attack synthesis, and (3) hardening and countermeasures. Along the first dimension, and in order to assess the vulnerability of system components, the PIs intend to adopt a control-theoretic approach to model the transient operation of common adaptive system and network components -- from schedulers, load balancers, and admission controllers to network traffic engineering and routing protocols. These models will be used to analytically characterize the vulnerabilities of such components to various exploits, whether the motive of such exploits is adversarial in nature (e.g., reducing a system's fidelity or effective capacity) or simply unfriendly (e.g., causing the system to preferentially treat a particular class of requests or flows). Along the second dimension, the PIs will investigate how a determined adversary could infer the vulnerabilities of a given system component through simple observations (from the outside), and thereupon design an exploit of low intensity but of high impact on the component's availability or service quality. Along the third dimension, the PIs intend to develop mechanisms that harden a component's susceptibility to exploits by non-clairvoyant adversaries, and also enable the identification (e.g., trace-back) of perpetrators.The PIs will focus their attention on two specific types of systems that are particularly vulnerable to exploits of adaptation dynamics, and with which they have had quite a bit of experience, namely (A) network management and engineering, and (B) scalable web services, virtual hosting environments, and firewalls. These systems are particularly vulnerable due to their open nature, necessitating the use of dynamic resource management policies, which are exploitable by adversaries.Expected outcomes from this effort include:- The development of metrics and techniques that are capable of quantifying the vulnerabilities of computing systems to exploits that target their dynamics. - The development of design principles that elucidate the tradeoffs between various design goals. For example, by relating a system's adaptation speed to its susceptibility to exploits, a system designer would be able to discern the risks and rewards involved in choosing one adaptation strategy versus another. - The development of novel adaptation strategies and protocols that would be tolerant to specific exploits. While the PIs' focus will be on adaptation techniques that are prevalent in Internet systems, the new approaches and principles they develop will be applicable to a much wider range of systems, including operating systems, embedded systems, sensor networks, ad-hoc and distributed systems, among others.BROADER IMPACT: The proposed work will also result in important tangible contributions to education and training through the development of various artifacts, including:- The creation of a repository that would act as a knowledge base of known vulnerabilities and defenses in various adaptive systems. The mere availability of such a repository would be quite instrumental in hardening newly developed systems by enabling practitioners access to what amounts to benchmarks for testing their designs.- The development of artifacts (e.g., tutorials, laboratory modules, software tools, and Web-based demonstrations) that could be integrated into standard systems and networking curricula. In addition, the pursuit of the proposed work will result in important intangible broader impacts, including:- Heightening the research community's appreciation of the importance of system dynamics, which will undoubtedly lead to concrete advancement in basic research with the expected outcomes of scientific publications and student training.- Leveraging the efforts of the PIs in extending their proven service record to the systems and networking research community, as well as their outreach to minority and under-represented groups.Last but not least, the pursuit of the research outlined in this proposal will promote the design of information systems, which are worthy of (and to which we can entrust) our society.
该提案旨在研究(并制定适当的防御措施)针对系统操作的“动态”的新兴漏洞-动态,这是大多数计算系统和网络中部署的适应策略的结果。虽然最近已经确定了沿着这些路线的对抗性利用的一些实例--即,PI对终端主机的准入控制器和网络中的TCP适配进行质量降低(RoQ)攻击--但对这种利用的重要性、流行性和其他非对抗性动机知之甚少,更不用说有效的防御了。智力优势:作为本提案一部分的工作将沿着沿着三个方面进行:(1)脆弱性评估,(2)攻击合成,以及(3)加固和对策。沿着第一个维度,为了评估系统组件的脆弱性,PI打算采用控制理论方法来模拟 通用自适应系统和网络组件的瞬态操作--从路由器、负载均衡器和准入控制器到网络流量工程和路由协议。这些模型将用于分析这些组件对各种漏洞的脆弱性,无论这些漏洞的动机本质上是敌对的(例如,降低系统的保真度或有效容量)或仅仅是不友好的(例如,使得系统优先处理特定类别的请求或流)。沿着第二个维度,PI将调查确定的对手如何通过简单的观察(从外部)推断给定系统组件的漏洞,并因此设计低强度但对组件的可用性或服务质量具有高影响的利用。沿着第三个维度,PI打算开发一种机制,使组件对非透视对手的利用更加敏感,并且还能够识别(例如,PI将把他们的注意力集中在两种特别容易受到适应动态利用的特定类型的系统上,并且他们对此有相当多的经验,即(A)网络管理和工程,以及(B)可扩展的web服务、虚拟托管环境和防火墙。这些系统由于其开放性而特别脆弱,需要使用动态资源管理策略,这是对手可以利用的。这项工作的预期成果包括:-开发能够量化计算系统漏洞的指标和技术,以利用其动态。 - 设计原则的发展,阐明了各种设计目标之间的权衡。例如,通过将系统的适应速度与其对漏洞的敏感性联系起来,系统设计者将能够辨别选择一种适应策略与另一种适应策略所涉及的风险和回报。- 开发新的适应策略和协议,以容忍特定的漏洞。虽然PI的重点将放在互联网系统中普遍存在的适应技术上,但他们开发的新方法和原则将适用于更广泛的系统,包括操作系统、嵌入式系统、传感器网络、自组织和分布式系统等。拟议的工作还将通过开发各种产品,为教育和培训做出重要的实际贡献,包括:- 创建一个存储库,作为各种自适应系统中已知漏洞和防御的知识库。仅仅是这样一个存储库的可用性就可以通过使从业者能够访问测试其设计的基准来加强新开发的系统。人工制品的发展(例如,教程、实验室模块、软件工具和基于Web的演示),可以集成到标准系统和网络课程中。此外,对拟议工作的追求将产生重要的无形的更广泛的影响,包括:-提高研究界对系统动力学重要性的认识,这无疑将导致基础研究的具体进展,并带来科学出版物和学生培训的预期成果。利用PI的努力,将其经过验证的服务记录扩展到系统和网络研究社区,以及他们对少数群体和代表性不足的群体的推广。最后但并非最不重要的是,本提案中概述的研究将促进信息系统的设计,这是值得的(我们可以委托)我们的社会。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Azer Bestavros其他文献
PeriScope: An active measurement API
PeriScope:主动测量 API
- DOI:
- 发表时间:
2002 - 期刊:
- 影响因子:0
- 作者:
Khaled Harfoush;Azer Bestavros;J. Byers - 通讯作者:
J. Byers
Basis token consistency: supporting strong Web cache consistency
基础令牌一致性:支持强Web缓存一致性
- DOI:
10.1109/glocom.2002.1189027 - 发表时间:
2002 - 期刊:
- 影响因子:0
- 作者:
A. Bradley;Azer Bestavros - 通讯作者:
Azer Bestavros
Safe compositional specification of networking systems
网络系统的安全组成规范
- DOI:
10.1145/1031134.1031139 - 发表时间:
2004 - 期刊:
- 影响因子:0
- 作者:
Azer Bestavros;A. Bradley;A. Kfoury;I. Matta - 通讯作者:
I. Matta
SETH: A VLSI Chip for the Real-Time Information Dispersal and Retrieval for Security and Fault-Tolerance
SETH:用于实时信息分发和检索的 VLSI 芯片,以实现安全性和容错性
- DOI:
- 发表时间:
1990 - 期刊:
- 影响因子:0
- 作者:
Azer Bestavros - 通讯作者:
Azer Bestavros
Specification and verification of real-time embedded systems using time-constrained reactive automata
使用时间约束反应自动机的实时嵌入式系统的规范和验证
- DOI:
10.1109/real.1991.160380 - 发表时间:
1991 - 期刊:
- 影响因子:0
- 作者:
Azer Bestavros - 通讯作者:
Azer Bestavros
Azer Bestavros的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Azer Bestavros', 18)}}的其他基金
SaTC: TTP: Small: Modular Platform for Web-based Secure Multi-Party Analytics
SaTC:TTP:小型:基于 Web 的安全多方分析的模块化平台
- 批准号:
1718135 - 财政年份:2017
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
Smart and Connected Communities Workshop: Visioning for Effective Community/University/Industry Collaboration Models
智能互联社区研讨会:有效社区/大学/行业合作模式的愿景
- 批准号:
1748189 - 财政年份:2017
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
PFI:BIC A Smart-city Cloud-based Open Platform and Ecosystem (SCOPE)
PFI:BIC 基于云的智慧城市开放平台和生态系统(SCOPE)
- 批准号:
1430145 - 财政年份:2014
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
TC:Large:Collaborative Research: Towards Trustworthy Interactions in the Cloud
TC:大型:协作研究:实现云中值得信赖的交互
- 批准号:
1012798 - 财政年份:2010
- 资助金额:
$ 30万 - 项目类别:
Continuing Grant
US-Middle East: Regional Workshop On Emerging Networking Research
美国-中东:新兴网络研究区域研讨会
- 批准号:
0958498 - 财政年份:2009
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
EAGER: Towards a Marketplace for Colocation of Cloud Services
EAGER:迈向云服务托管市场
- 批准号:
0952145 - 财政年份:2009
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
(CSR--EHS/CPS) Leveraging Type Systems for the Development of High-Assurance Cyber-Physical Systems and Appications
(CSR--EHS/CPS)利用类型系统开发高保证的网络物理系统和应用程序
- 批准号:
0720604 - 财政年份:2007
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
ICNP 2005 Travel Awards in Support of Graduate Students, Minority, and Minority-Serving Faculty
ICNP 2005 旅行奖支持研究生、少数族裔和少数族裔教师
- 批准号:
0548724 - 财政年份:2005
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
CISE Research Infrastructure: SENSORIUM: Research Infrastructure for Managing Spatio-Temporal Objects in Video Sensor Networks
CISE 研究基础设施:SENSORIUM:用于管理视频传感器网络中时空对象的研究基础设施
- 批准号:
0202067 - 财政年份:2002
- 资助金额:
$ 30万 - 项目类别:
Continuing Grant
ITR: Internet Flows as First-Class Values: Support for Dynamic, Flexible Internet Services
ITR:互联网流量是一流的价值:支持动态、灵活的互联网服务
- 批准号:
0205294 - 财政年份:2002
- 资助金额:
$ 30万 - 项目类别:
Standard Grant
相似国自然基金
甘草苷通过IFN-I/ISG15信号通路促进卵巢颗粒细胞外泌体分泌延缓卵巢衰老的作用机制
- 批准号:
- 批准年份:2025
- 资助金额:0.0 万元
- 项目类别:省市级项目
ISG15/LFA-1调控肿瘤相关巨噬细胞浸润促进胆囊癌免疫逃逸的机制研究
- 批准号:
- 批准年份:2025
- 资助金额:0.0 万元
- 项目类别:省市级项目
ISG15类泛素化修饰多囊泡小体介导KNG1-PI3K/Akt信号轴在葡萄膜炎内皮屏障损伤中的作用机制研究
- 批准号:JCZRQN202500743
- 批准年份:2025
- 资助金额:0.0 万元
- 项目类别:省市级项目
ISG15下调lncRNA RP11-5407.3介导细胞自噬促进子宫内膜癌进展的
作用及机制研究
- 批准号:
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
肾周脂肪M2 巨噬细胞通过ISG15/LFA-1轴调控传入神经活性在肥
胖相关高血压中的作用及机制研究
- 批准号:
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
ISG58 调控草鱼呼肠孤病毒复制的分子机制
- 批准号:2024JJ6247
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
STING/IFN-I/ISG15 在肝硬化内皮细胞损伤中的机制研究
- 批准号:2024JJ5610
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
ISG15介导西达苯胺对B细胞肿瘤靶点外排的抑制作用从而增强CAR-T疗效的研究
- 批准号:82300199
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
黑色素瘤BRAF抑制剂耐药新机制:USP18去ISG化cGAS促进自噬
- 批准号:
- 批准年份:2023
- 资助金额:0.0 万元
- 项目类别:省市级项目
骨髓ISG+NAMPT+中性粒细胞介导抗磷脂综合征B细胞异常活化的机制研究
- 批准号:82371799
- 批准年份:2023
- 资助金额:47.00 万元
- 项目类别:面上项目
相似海外基金
Development of Claw Pole Motor for ISG based on Deterioration Prediction of Iron Core due to Machining Process by using Crystal Grain
基于晶粒加工过程中铁芯劣化预测的 ISG 爪极电机的开发
- 批准号:
19J20572 - 财政年份:2019
- 资助金额:
$ 30万 - 项目类别:
Grant-in-Aid for JSPS Fellows
Elucidation of ISG-mediated suppression of mesenchymal tumor stromal cells by miRNAs in human T cell-released exosomes
阐明人 T 细胞释放的外泌体中 miRNA 对 ISG 介导的间充质肿瘤基质细胞的抑制
- 批准号:
18K15275 - 财政年份:2018
- 资助金额:
$ 30万 - 项目类别:
Grant-in-Aid for Early-Career Scientists
HIV-1 Vpr disrupts the IFN-TET-ISG pathway to promote HIV-1 infection and persistence
HIV-1 Vpr 破坏 IFN-TET-ISG 通路,促进 HIV-1 感染和持续存在
- 批准号:
10371668 - 财政年份:2016
- 资助金额:
$ 30万 - 项目类别:
HIV-1 Vpr disrupts the IFN-TET-ISG pathway to promote HIV-1 infection and persistence
HIV-1 Vpr 破坏 IFN-TET-ISG 通路,促进 HIV-1 感染和持续存在
- 批准号:
10015198 - 财政年份:2016
- 资助金额:
$ 30万 - 项目类别:














{{item.name}}会员




