Computational Resiliency. Steve J. Chapin, Susan Older Syracuse University Gregg Irvin Mobium Enterprises. Recap: What is Computational Resiliency?. The ability to sustain application operation and dynamically restore the level of assurance during an attack.
Steve J. Chapin, Susan Older
OASIS PI Meeting
The ability to sustain application operation
and dynamically restore the level
of assurance during an attack.
Application-centric self defense, built
on replication, migration, functionality
mutation, and camouflage.
Techniques applied to correct situation
Degraded Application trying to perform Mission CriticalFunction
Degraded Application sufficiently Improved by Resiliency to perform Mission Critical FunctionComputational Resiliency
Dudley does nothing.
Natasha attacks Rocky; caught by IDS.
Rocky’s job migrates back into safe zone;
Dudley must give up resources.
Boris attacks Bullwinkle’s job.
Some attacks succeed.
Bullwinkle’s job employs camouflage,
decoys, and migration.
Group 2Groups and Messaging
One group per cooperating task in a distributed computation.
Group 2Group Messaging Detail
In actuality, each member of Group 1 has
a channel to each member of Group 2.
Multiple nodes as threads in a single process
One or more processes per processorMapping of Nodes to Processors (channels not shown)