Tải bản đầy đủ (.pdf) (577 trang)

Information assurance dependability and security in networked systems

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (6.79 MB, 577 trang )


Information Assurance


This page intentionally left blank


The Morgan Kaufmann Series in Networking
Series Editor, David Clark, M.I.T.
Information Assurance: Dependability and
Security in Networked Systems
Yi Qian, James Joshi, David Tipper, and
Prashant Krishnamurthy

Network Analysis, Architecture, and Design,
Third Edition

Content Networking: Architecture, Protocols,
and Practice
Markus Hofmann and Leland R. Beaumont

Network Algorithmics: An Interdisciplinary
Approach to Designing Fast Networked Devices
George Varghese

James D. McCabe

Wireless Communications & Networking: An
Introduction
Vijay K. Garg


Ethernet Networking for the Small Office and
Professional Home Office
Jan L. Harrington

IPv6 Advanced Protocols Implementation
Qing Li, Tatuya Jinmei, and Keiichi Shima

Computer Networks: A Systems Approach,
Fourth Edition
Larry L. Peterson and Bruce S. Davie

Network Routing: Algorithms, Protocols, and
Architectures
Deepankar Medhi and Karthikeyan Ramaswami

Deploying IP and MPLS QoS for Multiservice
Networks: Theory and Practice
John Evans and Clarence Filsfils

Traffic Engineering and QoS Optimization of
Integrated Voice & Data Networks
Gerald R. Ash

IPv6 Core Protocols Implementation
Qing Li, Tatuya Jinmei, and Keiichi Shima

Smart Phone and Next-Generation Mobile
Computing
Pei Zheng and Lionel Ni


GMPLS: Architecture and Applications
Adrian Farrel and Igor Bryskin

Network Security: A Practical Approach
Jan L. Harrington

Network Recovery: Protection and Restoration
of Optical, SONET-SDH, IP, and MPLS
Jean Philippe Vasseur, Mario Pickavet, and Piet
Demeester

Routing, Flow, and Capacity Design in
Communication and Computer Networks
Michal Pióro and Deepankar Medhi

Wireless Sensor Networks: An Information
Processing Approach
Feng Zhao and Leonidas Guibas

Communication Networking: An Analytical
Approach
Anurag Kumar, D. Manjunath, and Joy Kuri

The Internet and Its Protocols: A Comparative
Approach
Adrian Farrel

Modern Cable Television Technology: Video,
Voice, and Data Communications, Second
Edition

Walter Ciciora, James Farmer, David Large, and
Michael Adams

Bluetooth Application Programming with the
Java APIs
C. Bala Kumar, Paul J. Kline, and Timothy J.
Thompson

Policy-Based Network Management: Solutions
for the Next Generation
John Strassner

MPLS Network Management: MIBs, Tools, and
Techniques
Thomas D. Nadeau


Developing IP-Based Services: Solutions for
Service Providers and Vendors

Internetworking Multimedia
Jon Crowcroft, Mark Handley, and Ian Wakeman

Monique Morrow and Kateel Vijayananda

Telecommunications Law in the Internet Age
Sharon K. Black

Optical Networks: A Practical Perspective,
Second Edition

Rajiv Ramaswami and Kumar N. Sivarajan

Internet QoS: Architectures and Mechanisms
Zheng Wang

TCP/IP Sockets in Java: Practical Guide for
Programmers
Michael J. Donahoo and Kenneth L. Calvert

TCP/IP Sockets in C: Practical Guide for
Programmers
Kenneth L. Calvert and Michael J. Donahoo

Multicast Communication: Protocols,
Programming, and Applications
Ralph Wittmann and Martina Zitterbart

Understanding Networked Applications: A First
Course
David G. Messerschmitt

Integrated Management of Networked Systems:
Concepts, Architectures, and their Operational
Application
Heinz-Gerd Hegering, Sebastian Abeck, and
Bernhard Neumair

Virtual Private Networks: Making the Right
Connection
Dennis Fowler


Networked Applications: A Guide to the New
Computing Infrastructure
David G. Messerschmitt

Wide Area Network Design: Concepts and Tools
for Optimization
Robert S. Cahn

MPLS: Technology and Applications
Bruce Davie and Yakov Rekhter

High-Performance Communication Networks,
Second Edition
Jean Walrand and Pravin Varaiya

For further information on these books and for a list
of forthcoming titles, please visit our Web site at
.


The Morgan Kaufmann Series in Computer Security
Information Assurance: Dependability and
Security in Networked Systems
Yi Qian, James Joshi, David Tipper, and
Prashant Krishnamurthy

Digital Watermarking and Steganography,
Second Edition
Ingemar Cox, Matthew Miller, Jeffrey Bloom,

Jessica Fridrich, and Ton Kalker

Network Recovery: Protection and Restoration of
Optical, SONET-SDH, IP, and MPLS
Jean-Philippe Vasseur, Mario Pickavet, and Piet
Demeester

For further information on these books and for a list
of forthcoming titles, please visit our Web site at
.


This page intentionally left blank


Information Assurance
Dependability and Security
in Networked Systems

Yi Qian
James Joshi
David Tipper
Prashant Krishnamurthy

AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Morgan Kaufmann is an imprint of Elsevier



Acquisitions Editor Rick Adams
Publishing Services Manager George Morrison
Project Manager M´onica Gonz´alez de Mendoza
Assistant Editor Gregory Chalson
Production Assistant Lianne Hong
Cover Design Eric Decicco
Composition diacriTech
Interior printer Sheridan Books, Inc.
Cover printer Phoenix Color Corporation
Morgan Kaufmann Publishers is an imprint of Elsevier.
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
This book is printed on acid-free paper.
Copyright c 2008 by Elsevier, Inc. All rights reserved.
Designations used by companies to distinguish their products are often claimed as trademarks or registered
trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names
appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies
for more complete information regarding trademarks and registration.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any
means—electronic, mechanical, photocopying, scanning, or otherwise—without prior written permission of the
publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford,
UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: You may also complete
your request online via the Elsevier homepage (), by selecting “Support & Contact” then
“Copyright and Permission” and then “Obtaining Permissions.”
Library of Congress Cataloging-in-Publication Data
Information assurance : dependability and security in networked systems / Yi Qian ... [et al.].
p. cm. – (The Morgan Kaufmann series in networking)
Includes bibliographical references and index.
ISBN 978-0-12-373566-9 (pbk. : alk. paper) 1. Computer networks–Security measures. 2. Computer
networks–Reliability. 3. Computer security. I. Qian, Yi, 1962–

TK5105.59.I5247 2007
005.8–dc22
2007033726
ISBN: 978-0-12-373566-9
For information on all Morgan Kaufmann publications,
visit our Web site at www.mkp.com or www.books.elsevier.com
Printed in the United States of America
07 08 09 10 11 12 13
10 9 8 7 6 5 4 3 2 1


To my wife Melodee, son Joshua and daughter Michelle
—Yi Qian

To my wife Tripti, daughter Jaimee, and parents Hem and Prava
—James Joshi

In memory of my father, C.E. Tipper who encouraged and enabled my education
—David Tipper

To my parents, Krishnamurthy and Shantha whose blessings
I count as my fortune every day
—Prashant Krishnamurthy


This page intentionally left blank


Contents


1

Preface

xxiii

Contributors

xxvii

Information Assurance
by Yi Qian, University of Puerto Rico at Mayaguez, Puerto Rico, and
James Joshi, David Tipper, and Prashant Krishnamurthy, University of
Pittsburgh, USA
1.1

Introduction

1.2

Information Assurance: Dependability and Security of Networked
Information Systems 3

1.3

Book Organization
1.3.1
1.3.2
1.3.3


1

7

The Three Parts of the Book 7
Chapter 2: Network Security 8
Chapter 3: Security for Distributed Systems: Foundations of
Access Control 8
1.3.4 Chapter 4: Network Survivability 9
1.3.5 Chapter 5: System Survivability 9
1.3.6 Chapter 6: Taxonomy and Framework for Integrating
Dependability and Security 9
1.3.7 Chapter 7: Stochastic Models/Techniques for Secure and
Survivable Systems 10
1.3.8 Chapter 8: Integrated Dependability and Security Evaluation
Using Game Theory and Markov Models 10
1.3.9 Chapter 9: Scenario Graphs Applied to Network Security 11
1.3.10 Chapter 10: Vulnerability-Centric Alert Correlation 11

1


Contents

xii

1.3.11 Chapter 11: Monitoring and Detecting Attacks in All-Optical
Networks 11
1.3.12 Chapter 12: Robustness Evaluation of Operating Systems 12
1.3.13 Chapter 13: Intrusion Response Systems: A Survey 12

1.3.14 Chapter 14: Secure and Resilient Routing: A Framework for Resilient
Network Architectures 13
1.3.15 Chapter 15: Wireless Systems Security and Survivability 13
1.3.16 Chapter 16: Integrated Fault and Security Management 14
1.4

Part I:

2

Conclusion

14

References

14

Foundational Background on Security and Dependability
Techniques

17

Network Security

19

by James Joshi and Prashant Krishnamurthy, University of Pittsburgh, USA
2.1


Introduction

2.2

Network Attacks and Security Issues

2.3

2.2.1 Network Communications 20
2.2.2 Some Example Security Attacks 23
2.2.3 Security Attacks, Services, and Architecture
Protection and Prevention 27
2.3.1
2.3.2

3

19
19

Firewalls and Perimeter Security
Cryptographic Protocols 30

2.4

Detection

2.5

Assessment and Response


2.6

Conclusion

37

References

37

26

27

34
36

Security for Distributed Systems: Foundations of Access Control 39
by Elisa Bertino, Purdue University, USA, and Jason Crampton, University of
London, UK
3.1

Introduction

39


Contents


xiii
3.2

Identification and Authentication
3.2.1
3.2.2
3.2.3
3.2.4

3.3

Access Control
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6

3.4

4

Access Control Based on Subject–Object
Relationships 48
Protection Matrix Model 48
An Information Flow Policy for Confidentiality
Bell-LaPadula Model 55
Clark-Wilson Model 56
Role-Based Access Control 59

Overview of Relevant Standards
Advanced Approaches 65

Digital Identity Management
3.5.1
3.5.2
3.5.3
3.5.4

3.6

46

Access Control in Distributed Systems
3.4.1
3.4.2

3.5

40

Password-Based Authentication 41
Insecure Communication Channels 42
Challenge-Response Systems 42
Authentication in Distributed Systems 43

53

60
61


72

Shibboleth 73
CardSpace 74
Higgins Trust Framework 75
Research Approaches 75

Conclusion

76

References

77

81

Network Survivability
by Bjorn Jager, Molde University, Norway, John Doucette,
University of Alberta Edmonton, Canada, and David Tipper
University of Pittsburgh, USA
4.1

Introduction

4.2

Prevention Techniques


4.3

Survivable Network Design and Traffic Restoration Concepts
4.3.1
4.3.2
4.3.3

81
83

Typical Network Architecture 84
Basic Survivability Concepts 86
Basic Network Management Concepts

87

84


Contents

xiv
4.3.4
4.3.5
4.4

Protection versus Restoration
Other Issues 89

Transport Network Recovery Techniques

4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
4.4.6

Automatic Protection Switching
Ring-Based Survivability 93
Span Restoration 95
Shared Path Protection 96
Shared Path Restoration 97
p-Cycles 98

4.5

Survivable Network Design Techniques

4.6

Multilayer Issues

4.7

Conclusion and Future Research Areas
References

5

88

91
91

101

104
107

108

113

System Survivability
by Axel Krings, University of Idaho, USA
5.1

Introduction and Background

5.2

Survivability and the Impact of Fault Models
5.2.1
5.2.2

5.3

119

Identification of Essential Functionalities 121
Tolerating Faults 123

Dealing with Common-Mode Faults 124
Applying the Notion of Optimality 125

5.4

Decentralized Storage

5.5

Survivability of Large Distributed Systems

5.6

Borrowing from Well-established Fields
5.6.1
5.6.2
5.6.3

5.7

115

Dependability Considerations 116
Survivability Considerations 118

Design for Survivability
5.3.1
5.3.2
5.3.3
5.3.4


113

126
128
133

Problem Transformation 133
Scheduling Problems 136
Case Study: Autonomous Mobile Agents

Conclusion

141

References

142

139


Contents

xv

Part II: Modeling the Interaction between Dependability and Security 147
6

Taxonomy and Framework for Integrating Dependability

and Security

149

by Jiankun Hu, Peter Bertok, and Zahir Tari, RMIT University,
Australia
6.1

Introduction

6.2

Basic Concepts and Related Work
6.2.1
6.2.2

6.3

150

Dependability 150
Integration of Dependability and Security

Proposed Taxonomy and Framework
6.3.1
6.3.2

Key Notations of the Feedback Control System Model 154
Definitions of Basic Concepts of Dependability and Security within the
Proposed Framework 155


Dependability, Security, and their Attributes

6.5

6.4.1 Taxonomy of Faults 157
The Means to Attain Dependability and Security

6.6

152

154

6.4

6.5.1
6.5.2
6.5.3

7

149

155
164

Fault Prevention 164
Fault Tolerance 166
Fault Removal 166


Conclusion

168

References

168

Stochastic Modeling Techniques for Secure and Survivable
Systems
by Kishor S. Trivedi, Duke University, USA, and Vaneeta Jindal and
Selvamuthu Dharmaraja, Indian Institute of Technology, India
7.1

Introduction

7.2

7.1.1 Survivability and Security 172
Analytical Modeling Techniques 173
7.2.1

171

Markov Models

174

171



Contents

xvi
7.2.2
7.2.3
7.3

Semi-Markov Process 176
Higher-Level Model Formalisms

Security Modeling
7.3.1
7.3.2

Intrusion-Tolerant Systems [3] 180
Security Modeling of SITAR Security System [4]

7.4

Survivability Modeling

7.5

7.4.1 System Description [31]
Conclusion 205
References

8


177

179
188

190
192

205

Integrated Dependability and Security Evaluation Using Game
209
Theory and Markov Models
by Bjarne E. Helvik, Karin Sallhammar, and Svein J. Knapskog,
University of Science and Technology, Norway
8.1

Introduction
8.1.1
8.1.2

8.2

Previous Work
Outline 213

Stochastic Modeling
8.2.1
8.2.2

8.2.3
8.2.4
8.2.5

8.3

209
212
213

Failure Process 215
Modeling Intrusion as Transitions 216
Modeling the System 217
Obtaining System Measures 218
Model Parametrization 220

Predicting Attacker Behavior
8.3.1
8.3.2
8.3.3

Reward and Cost Concept 222
Modeling Interactions as a Game
Stochastic Game Model 224

8.4

Defining and Solving the Game

8.5


Tuning the Game Parameters
8.5.1
8.5.2
8.5.3

8.6

225
230

One Possible Attack Action 231
Two Possible Attack Actions 233
Attacker Profiling 235

Case Study: DNS Service
8.6.1
8.6.2

221

236

Stochastic Model 237
Stochastic Game 237

223


Contents


xvii
8.6.3
8.6.4
8.7

9

Four Scenarios 238
Comparing the Scenarios

Conclusion

240

References

243

239

247

Scenario Graphs Applied to Network Security
by Jeannette M. Wing, Carnegie Mellon University, USA
9.1

Introduction

9.2


Algorithms for Generating Scenario Graphs
9.2.1
9.2.2

Attack Graphs are Scenario Graphs

9.4

Network Attack Graphs

9.5

9.6

9.7

257

Example Network Components
Sample Attack Graphs 264

Attack Graph Analysis
9.6.1
9.6.2

259

266


Single Action Removal 267
Critical Action Set Minimization

Practical Experience
9.7.1
9.7.2

251

253

Network Attack Model 253
Network Components 254

Example Network
9.5.1
9.5.2

248

Symbolic Algorithm 248
Explicit-State Algorithm 250

9.3

9.4.1
9.4.2

267


269

Performance 269
Toolkit 271

9.8

Related Work

9.9

Future Work and Conclusion
References

10

247

272
274

276

279

Vulnerability-Centric Alert Correlation

by Lingyu Wang, Concordia University, Canada, and Sushil Jajodia, George
Mason University, USA
10.1 Introduction


279

10.2 Review of Alert Correlation and Related Techniques
10.3 Attack Graph

284

282


Contents

xviii
10.4 Alert Correlation, Hypothesis, Prediction, and Aggregation
10.4.1
10.4.2
10.4.3
10.4.4
10.4.5

287

Alert Correlation in Offline Applications 287
Vulnerability-Centric Alert Correlation 289
Alert Hypothesis and Prediction 292
Alert Aggregation 296
Empirical Results 298

10.5 Conclusion


300

10.6 Acknowledgments
References

300

301

Part III: Design and Architectural Issues for Secure and Dependable

11

Systems

305

Monitoring and Detecting Attacks in All-Optical Networks

307

by Arun K. Somani and Tao Wu, Iowa State University, USA
11.1 Introduction
11.1.1
11.1.2
11.1.3
11.1.4

307


Security Problems in All-Optical Networks 308
Possible Attacks 308
All-Optical Network Attack Types 309
Issues in Crosstalk Attack Diagnostic Algorithms 310

11.2 Crosstalk Attack Features and Monitoring Techniques
11.2.1 Crosstalk Attack Features 311
11.2.2 Security Consideration 312
11.2.3 Overview of Current Monitoring Methods
11.3 Node, Attack, and Monitor Models

311

313

315

11.3.1 Node Model 315
11.3.2 Crosstalk Attack Model 315
11.3.3 Monitor Node Model 318
11.4 Necessary and Sufficient Conditions for Crosstalk Attack Detection
11.4.1 Single Crosstalk Attack in a Network
11.4.2 Monitoring Relationship 320
11.5 One-crosstalk Attack Diagnosable Conditions

320

320
325


11.5.1 Detecting the Status of a Connection under One–Original Attack Flow
Conditions 327
11.5.2 Computational Complexity 329


Contents

xix
11.6 k-Crosstalk Attacks in the Network

329

11.6.1 k-Crosstalk Attack Diagnosable Condition 330
11.6.2 Detecting Global Status of Connections 334
11.6.3 Computational Complexity 335
11.7 Sparse Monitoring and Routing Algorithms

336

11.7.1 Sparse Monitoring, Test Connection, and Routing for a Single Original
Attack Flow Policy I 336
11.7.2 Examples 337
11.7.3 Sparse Monitoring, Test Connection, and Routing Policy II 338
11.7.4 Connection Routing Algorithm in One–Original Attack Flow
Networks 340
11.7.5 Example 341
11.8 Sparse Monitoring, Test Connection, and Routing for More than One Original
Attack Flow 342
11.8.1 Examples 343

11.9 Conclusion 345
References

12

345

Robustness Evaluation of Operating Systems
by Andréas Johansson and Neeraj Suri, Technische Universität
of Darmstadt, Germany
12.1 Introduction

349

12.1.1 Case Study
12.2 Evaluation Goals

351
352

12.2.1 Case Study 353
12.3 Target System 353
12.3.1 Case Study 354
12.4 Error Model and Workload Selection
12.4.1
12.4.2
12.4.3
12.4.4
12.4.5


Error Type 356
Error Location 358
Error Timing 358
Workload Selection 358
Case Study 359

12.5 Robustness Metrics
12.5.1 Case Study

361
362

355

349


Contents

xx
12.6 Presentation and Interpretation of Results

13

12.7 Conclusion

369

References


370

365

377

Intrusion Response Systems: A Survey
by Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu,
Saurabh Bagchi, and Eugene H. Spafford, Purdue University, USA
13.1 Introduction

377

13.2 Static Decision-making Systems

381

13.2.1 Generic Authorization and Access Control—Application Programming
Interface 381
13.2.2 Snort Inline 384
13.2.3 McAfee Internet Security Suite 385
13.2.4 Other Systems 386
13.3 Dynamic Decision-making Systems

387

13.3.1
13.3.2
13.3.3
13.3.4


Broad Research Issues 387
Adepts 388
ALPHATECH Light Autonomic Defense System 390
Cooperating Security Managers and Adaptive, Agent-Based
Intrusion Response Systems 392
13.3.5 Emerald 394
13.3.6 Other Dynamic Intrusion Response Systems 396

13.4 Intrusion Tolerance through Diverse Replicas

397

13.4.1
13.4.2
13.4.3
13.4.4
13.4.5

Broad Research Issues 398
Building Survivable Services Using Redundancy and Adaptation
Scalable Intrusion-Tolerant Architecture 399
Survival by Defense Enabling 400
Implementing Trustworthy Services Using Replicated State
Machines 401
13.4.6 Distributing Trust on the Internet 402

13.5 Responses to Specific Kinds of Attacks

403


13.5.1 Primitives for Responding to DDoS 404
13.5.2 CITRA 404
13.5.3 Cooperative Counter-DDoS Entity 406
13.6 Benchmarking Intrusion Response Systems
13.7 Thoughts on Evolution of IRS Technology

407
410

398


Contents

14

xxi
13.8 Conclusion

412

References

412

Secure and Resilient Routing: Building Blocks for Resilient
Network Architectures

417


by Deep Medhi, University of Missouri–Kansas City, USA, and Dijiang
Huang, Arizona State University, USA
14.1 Introduction

417

14.2 Traffic Engineering Perspective and its Relation to Network
Robustness 419
14.2.1 An Illustrative Example 421
14.3 Components of a Resilient Network Architecture

423

14.4 Threats and Countermeasures in Link-State Routing

424

14.4.1 Link-State Routing Model and Threat Model 424
14.4.2 Preventive Cryptographic Countermeasures against Attacks
14.5 Resilient Architecture: Virtualization and Routing

428

435

14.5.1 An Enabling Framework for Adaptive and Secure Virtualized
Networking 435
14.5.2 Routing Protocol Extension: OSPF-E 440
14.5.3 Network Analysis: Preliminary Results 444

14.6 Conclusion

446

References

446

14.A Secure Group Communication
14.A.1
14.A.2
14.A.3
14.A.4

15

449

Using One-Way Function Chain to Build Key Chain
Key Distribution 451
Key Agreement Protocol 454
Assessment 456

449

459

Security and Survivability of Wireless Systems

by Yi Qian, University of Puerto Rico at Mayaguez, Puerto Rico, and

Prashant Krishnamurthy and David Tipper, University of Pittsburgh, USA
15.1 Introduction

459

15.2 Background

460

15.3 Current Security Approaches in Wireless Networks

463


Contents

xxii
15.4 Current Survivability Approaches in Wireless Networks

465

15.5 Framework for Wireless Network Survivability and Security

467

15.6 Interaction between Survivability and Security in Wireless Networks

470

15.6.1 Extending the Framework to Include Interactions between Security and

Survivability 472
15.6.2 Case Study I: Idle Handoffs 475
15.6.3 Case Study II: Key Management in Heterogeneous Sensor Networks 476

16

15.7 Conclusion

484

References

485

489

Integrated Fault and Security Management

by Ehab Al-Shaer, DePaul University, USA, and Yan Chen, Northwestern
University, USA
16.1 Introduction

489

16.2 Active Integrated Fault Identification Framework
16.2.1
16.2.2
16.2.3
16.2.4
16.2.5


490

Background 490
Related Work 491
Challenges and Problem Formalization 492
Integrated Fault Intrusion Reasoning 495
Simulation Study 502

16.3 Fault and Security Management on High-speed Networks
16.3.1
16.3.2
16.3.3
16.3.4

Background 506
Related Work 508
Architecture of the HiFIND System
Evaluation 515

16.4 Conclusion

520

References

520

Index


506

511

523


Preface

WHY THIS BOOK IS NEEDED
About five years back, we initiated an information assurance program at the University of Pittsburgh under the flagship of Laboratory of Education and Research
in Information Assurance Education (LERSAIS), which was created for that
purpose. We had to often explore and discuss issues related to security, dependability, survivability, etc., with respect to what could be accommodated within the
area of IA, while planning for (a) the curricular content that aligns with the
National Security Agency’s center of excellence in information assurance education (CAEIAE) program and it’s Committee on National Security Systems (CNSS)
information assurance (IA) standards (now considered the US national IA education standards), and (b) the long term research agenda for LERRSAIS. Coming
from different research background including that of security, dependability and
others, we often found it difficult to reconcile the different perspectives related to
the notion of IA and more specifically that of assurance which roughly appears to
have brought together the notion of integrating security and dependability aspects of
networked information systems. We realized that there is no well established definition of assurance, and more importantly, there is a lack of interaction between
the security and the dependability communities. At the same time, our interest in
research related to integrated approach to addressing security and dependability
aspects grew and we were convinced that such an approach would help generate
more wholesome solutions to trustworthy and high assurance systems.
With the rapid developments in information technologies (IT) over last several
years, our global society has embarked in a path where we are critically dependent on IT infrastructures. Infrastructural failures, cyber attacks and cyberwars
are now looming realities that can have catastrophic effects on the global society
and each individual’s life. With the growing complexity and interconnectedness
of information systems, even simple disruptive event can have dire consequences.



Preface

xxiv

Securing and ensuring the dependability of such IT environment is a growing
challenge and there is a critical need for pragmatic solutions that can accommodate known and unknown disruptive events and enable systems to adopt and
survive any type of disruptions. We are convinced that only through the involvement of both the dependability and security communities can such a singular goal
of developing highly assured, survivable information systems can be achieved.
While there have been some efforts towards this direction, it has not been very
successful. We planned this book with a hope to generate the needed momentum
that matches the criticality of this need.

APPROACH
Both security and dependability areas are rich and well-developed enough to have
several books on their topics and trying to bring all issues together is going to
be simply futile. Our attempt here, therefore, has been to bring together issues
that emphasize the interaction and integration between the technologies available within the security and dependability areas with the hope to convince the
readers about the importance of and the critical need for combined, more holistic approaches. Towards this, we have included chapters that provide overviews of
the various issues in a concise manner as well as more technically detailed chapters
that focus on some significant issues. We have also tried to accommodate the diversity of issues by incorporating chapters that focus on different systems and architectural components such as operating platforms, wired and wireless networks,
applications, etc.

ACKNOWLEDGMENTS
We are sincerely indebted to the contributors of this book for their support and
diligent work, without which this book would not have been possible. We express
our deep appreciation for their understanding and bearing with our organizational weaknesses. We would like to thank the reviewers of proposal for this book
for their comments and suggestions. In particular, we were highly motivated by
their support for the view that “interaction” aspect of our goal for the book is a

crucial component; their “cautionary note” with regards to the challenge of appropriately hitting the “interaction” note helped us take extra measure to ensure that
we achieve that goal. We hope that we have done that.
We express our thanks to the staff of Elsevier Inc. for their support for this
undertaking. In particular, we would like to thank Rick Adams, Senior Acquisitions Editor at Elsevier, for all the support and guidance, as well as for providing


×