SlideShare a Scribd company logo
1 of 2
Abstract

Mission critical systems, initially thought of as something that strictly belongs to a military
setting are increasingly becoming commonplace. It may not be easily perceived but most of the
systems today (military or industrial) are mission critical. Moreover, a rapid increase in the
structural complexity of these systems not only leads to an increase in benign faults but open
doors to malicious entities. Over the years, these malicious entities in cyber-space have grown
smarter and extremely resourceful. Therefore, mission assurance is a growingly important
necessity.

Mission assurance is a generic term encompassing diverse measures required to make the
critical operations (missions) more resilient. In this dissertation proposal, the focus is
specifically on mission survivability (a subset of mission assurance), which is the ability of a
system to fulfill its mission in a timely manner. It generally involves four layers of security:
prevention, detection, recovery and adaptation. The first two layers, viz. prevention and
detection, are meant to provide a strong defense. If these two layers fail in protecting the
system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on
the recovery phase, it is quite possible that the mission will fail due to lack of any further
countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer
of defense, they are generally activated during or after the recovery phase. Without a
successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore,
mission critical systems need the provisioning of another layer of defense beyond the
conventional recovery phase.

The attack model in this research realistically represents today’s era of cyber warfare and
competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An
aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks.
Thus, they are more capable of hiding longer and corrupting the final mission response. Current
literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle.
However, when a certain conditions are met (like, contingency plan activated on discovery), a
stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived
state of the system (like success/failure of the attempted attack). Consequently, the defense
scheme employs deceptive and adaptive measures to ensure mission survivability against such
attackers.

The proposed framework focuses on ensuring mission survivability against stealthy attackers by
employing a deception-based secure proactive recovery scheme. This scheme has three major
components. The first component is the surreptitious detection of signs of intrusion without
raising an alert. Since this step is based entirely on the host intrusion detection system, there is
a need to ensure that it is working tamper-proof at all times. This brings us to the classic
problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies
are employed that leverage the parallelism offered by multi-core architecture for increased
effectiveness. Second component is the scheme to make detection information invisible and
inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT)
circuitry on the system processor. Third component is the use of deception-based recovery
scheme to increase the probability of mission survival. So far, a centralized system employing
this scheme has been developed. A multi-phase evaluation methodology has also been
developed for performance evaluation of this system under realistic operating conditions.
Results are found to be promising with low time and performance overhead.

Future work involves enhancing this solution for its deployment in a decentralized environment
while still maintaining its tamper-resistance and mission survivability properties.

More Related Content

What's hot

「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~ 「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
株式会社メタップスホールディングス
 
State of the Cloud 2017
State of the Cloud 2017State of the Cloud 2017
State of the Cloud 2017
Bessemer Venture Partners
 

What's hot (18)

Hack Fund V - Pitch Deck
Hack Fund V - Pitch DeckHack Fund V - Pitch Deck
Hack Fund V - Pitch Deck
 
Product Market Fit Presentation - May 2023 - Jeff Bussgang
Product Market Fit Presentation - May 2023 - Jeff BussgangProduct Market Fit Presentation - May 2023 - Jeff Bussgang
Product Market Fit Presentation - May 2023 - Jeff Bussgang
 
Valuations: What is happening and does it matter?
Valuations: What is happening and does it matter?Valuations: What is happening and does it matter?
Valuations: What is happening and does it matter?
 
Organisational Best Practices of Startup Studios
Organisational Best Practices of Startup Studios Organisational Best Practices of Startup Studios
Organisational Best Practices of Startup Studios
 
Twitterin algoritmit, ajankohtaiset ilmiöt ja verkostot
Twitterin algoritmit, ajankohtaiset ilmiöt ja verkostotTwitterin algoritmit, ajankohtaiset ilmiöt ja verkostot
Twitterin algoritmit, ajankohtaiset ilmiöt ja verkostot
 
「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~ 「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
「少数精鋭で勝つ」Androidアプリ世界展開のポイント~アプリ収益化編~
 
Lean Startups Steve Blank Eric Ries
Lean Startups Steve Blank Eric RiesLean Startups Steve Blank Eric Ries
Lean Startups Steve Blank Eric Ries
 
WikiPlan事業計画書
WikiPlan事業計画書WikiPlan事業計画書
WikiPlan事業計画書
 
Team Quantum - 2022 Technology, Innovation & Great Power Competition
Team Quantum  - 2022 Technology, Innovation & Great Power CompetitionTeam Quantum  - 2022 Technology, Innovation & Great Power Competition
Team Quantum - 2022 Technology, Innovation & Great Power Competition
 
How to VC: Creating a VC fund portfolio model
How to VC: Creating a VC fund portfolio modelHow to VC: Creating a VC fund portfolio model
How to VC: Creating a VC fund portfolio model
 
大学業務の子マッピングと事務職員のコア・コンピテンシーについて考える
大学業務の子マッピングと事務職員のコア・コンピテンシーについて考える大学業務の子マッピングと事務職員のコア・コンピテンシーについて考える
大学業務の子マッピングと事務職員のコア・コンピテンシーについて考える
 
The Notation Annual Meeting - 2019
The Notation Annual Meeting - 2019The Notation Annual Meeting - 2019
The Notation Annual Meeting - 2019
 
Disruptive Innovation
Disruptive InnovationDisruptive Innovation
Disruptive Innovation
 
State of the Cloud 2017
State of the Cloud 2017State of the Cloud 2017
State of the Cloud 2017
 
2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of Europe2019 Accel Euroscape: The Rise of Europe
2019 Accel Euroscape: The Rise of Europe
 
Seedcamp Fund V Fundraising Deck
Seedcamp Fund V Fundraising DeckSeedcamp Fund V Fundraising Deck
Seedcamp Fund V Fundraising Deck
 
VC Fundraising Deck Template: Carta x Kauffman Fellows
VC Fundraising Deck Template: Carta x Kauffman FellowsVC Fundraising Deck Template: Carta x Kauffman Fellows
VC Fundraising Deck Template: Carta x Kauffman Fellows
 
新規事業・起業を妨げる「ビジネスモデル症候群」とは
新規事業・起業を妨げる「ビジネスモデル症候群」とは新規事業・起業を妨げる「ビジネスモデル症候群」とは
新規事業・起業を妨げる「ビジネスモデル症候群」とは
 

Viewers also liked

Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal
Monica Betz
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
Chinta Musundi-Beez
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
Momy Saikia
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
Vanessa Cuesta
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
Vicki Shaw
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
Sparknsk
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
zukun
 

Viewers also liked (20)

Sample research proposal
Sample research proposalSample research proposal
Sample research proposal
 
Primerica Smart Loan
Primerica Smart LoanPrimerica Smart Loan
Primerica Smart Loan
 
Loan Proposal
Loan ProposalLoan Proposal
Loan Proposal
 
Research Proposal Template/Sample
Research Proposal Template/SampleResearch Proposal Template/Sample
Research Proposal Template/Sample
 
Sample Research proposal
Sample Research proposal Sample Research proposal
Sample Research proposal
 
Writing Research Proposal
Writing Research Proposal Writing Research Proposal
Writing Research Proposal
 
Abstract - PhD Research Proposal
Abstract - PhD Research ProposalAbstract - PhD Research Proposal
Abstract - PhD Research Proposal
 
Proposal sample 1
Proposal sample 1Proposal sample 1
Proposal sample 1
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca ColaCoca Cola Consoldiated incidence pricing agreement with Coca Cola
Coca Cola Consoldiated incidence pricing agreement with Coca Cola
 
1 scl dan kbk
1 scl dan kbk1 scl dan kbk
1 scl dan kbk
 
Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...Reasons for foreign listings by South African junior mining and exploration c...
Reasons for foreign listings by South African junior mining and exploration c...
 
Kiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACSKiss fewer frogs - BNI INSOMNIACS
Kiss fewer frogs - BNI INSOMNIACS
 
BNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About MeBNI Achievers Chapter - 10mins The Story About Me
BNI Achievers Chapter - 10mins The Story About Me
 
ОГУ-НСФЛ
ОГУ-НСФЛОГУ-НСФЛ
ОГУ-НСФЛ
 
Usabilidad
UsabilidadUsabilidad
Usabilidad
 
The Seven levers of sales and marketing performance
The Seven levers of sales and marketing performanceThe Seven levers of sales and marketing performance
The Seven levers of sales and marketing performance
 
03 cv mil_probability_distributions
03 cv mil_probability_distributions03 cv mil_probability_distributions
03 cv mil_probability_distributions
 
Week 2: Setting up your Account
Week 2: Setting up your AccountWeek 2: Setting up your Account
Week 2: Setting up your Account
 
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticasAprendiendo sobre las emociones de los pacientes mediante obras artísticas
Aprendiendo sobre las emociones de los pacientes mediante obras artísticas
 

Similar to Dissertation Proposal Abstract

Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
AnnaRose80
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
UltraUploader
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
UltraUploader
 

Similar to Dissertation Proposal Abstract (20)

RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
 
An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow Integrity
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
 

More from Ruchika Mehresh

Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Ruchika Mehresh
 

More from Ruchika Mehresh (7)

A deception framework for survivability against next generation
A deception framework for survivability against next generationA deception framework for survivability against next generation
A deception framework for survivability against next generation
 
PNUTS
PNUTSPNUTS
PNUTS
 
Centrifuge
CentrifugeCentrifuge
Centrifuge
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Proposal defense presentation
Proposal defense presentationProposal defense presentation
Proposal defense presentation
 
Pnuts
PnutsPnuts
Pnuts
 
Pnuts Review
Pnuts ReviewPnuts Review
Pnuts Review
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Dissertation Proposal Abstract

  • 1. Abstract Mission critical systems, initially thought of as something that strictly belongs to a military setting are increasingly becoming commonplace. It may not be easily perceived but most of the systems today (military or industrial) are mission critical. Moreover, a rapid increase in the structural complexity of these systems not only leads to an increase in benign faults but open doors to malicious entities. Over the years, these malicious entities in cyber-space have grown smarter and extremely resourceful. Therefore, mission assurance is a growingly important necessity. Mission assurance is a generic term encompassing diverse measures required to make the critical operations (missions) more resilient. In this dissertation proposal, the focus is specifically on mission survivability (a subset of mission assurance), which is the ability of a system to fulfill its mission in a timely manner. It generally involves four layers of security: prevention, detection, recovery and adaptation. The first two layers, viz. prevention and detection, are meant to provide a strong defense. If these two layers fail in protecting the system, recovery layer is the fallback plan. Yet, if a determined adversary stages an attack on the recovery phase, it is quite possible that the mission will fail due to lack of any further countermeasures. Though adaptation/evolution mechanisms are considered as the fourth layer of defense, they are generally activated during or after the recovery phase. Without a successful recovery, adaptation/evolution mechanisms will hardly be effective. Therefore, mission critical systems need the provisioning of another layer of defense beyond the conventional recovery phase. The attack model in this research realistically represents today’s era of cyber warfare and competitive open market. The attacker is assumed to be resourceful, adaptive and stealthy. An aggressive attacker is easily detected, but stealthy attackers deploy multi-stage stealth attacks. Thus, they are more capable of hiding longer and corrupting the final mission response. Current literature assumes that a stealthy attacker stays stealthy throughout the mission life cycle. However, when a certain conditions are met (like, contingency plan activated on discovery), a stealthy and adaptive attacker can turn aggressive. Thus, the attack model used here considers
  • 2. attacker’s capability to alter his initial behavior (stealthy or aggressive) based on the perceived state of the system (like success/failure of the attempted attack). Consequently, the defense scheme employs deceptive and adaptive measures to ensure mission survivability against such attackers. The proposed framework focuses on ensuring mission survivability against stealthy attackers by employing a deception-based secure proactive recovery scheme. This scheme has three major components. The first component is the surreptitious detection of signs of intrusion without raising an alert. Since this step is based entirely on the host intrusion detection system, there is a need to ensure that it is working tamper-proof at all times. This brings us to the classic problem of ‘who watches the watcher’. To address this concern, cyclic monitoring topologies are employed that leverage the parallelism offered by multi-core architecture for increased effectiveness. Second component is the scheme to make detection information invisible and inaccessible to the attacker. This is achieved using redundant and unused design for test (DFT) circuitry on the system processor. Third component is the use of deception-based recovery scheme to increase the probability of mission survival. So far, a centralized system employing this scheme has been developed. A multi-phase evaluation methodology has also been developed for performance evaluation of this system under realistic operating conditions. Results are found to be promising with low time and performance overhead. Future work involves enhancing this solution for its deployment in a decentralized environment while still maintaining its tamper-resistance and mission survivability properties.