Title: RSRS Architecture Study
1RSRS Architecture Study
- Doug Blough and Calton Pu
- CERCS/Georgia Tech
2Study Outline
- Part 1 Architectural Analysis and SRS Evaluation
- Develop high-level architecture concept
- Study existing projects and evaluate how they fit
with architecture - Evaluate program strengths/weaknesses vis-a-vis
architecture - Part 2 Moving Forward
- Develop more concrete architecture
- Apply architecture to system examples and an
application scenario
3Part 1 Architectural Analysis and Evaluation of
SRS Projects
4RSRS Architecture
Reasoning About Insider Threats
Biologically-Inspired Diversity Tools (BID)
GSR
GSR
Monitor
Learning
Actuator
BID
GSR
Attacks
Attacks
Granular, Scalable, Redundant Data and
Communication (GSR)
Applications
Applications
Cognitive Immunity and Regeneration Environment
5RSRS Architecture applied to Cognitive Area
Biologically-Inspired Diversity Tools (BID)
Learning
Actuator
Monitor
Attacks
Attacks
Cognitive Immunity and Regeneration Environment
Applications
Applications
Granular, Scalable, Redundant Data and
Communications (GSR)
6Comparison of Cognitive Projects
AWDRAT
Learn/Repair
differencer
restoration
model-based
variable observ.
data repair
constraints
System models
Model-based Executive
Cortex
query
Taster DBs
Learning model
State estimate
Mission-aware response
statistical learning
observe
react
compare
Master DB
7Summary of Cognitive Projects
- 3 of 4 projects employ model-based approaches
(Model-Based, AWDRAT, Cortex) - Model-based approaches are well-suited for
embedded systems, e.g. autonomous vehicles, or
single applications, e.g. SQL - Cognitive approaches still need to be developed
and proven for large complex systems - Learn/Repair is developing self-regenerative
techniques that can be applied inside a program
8RSRS Architecture applied to Diversity Area
Biologically-Inspired Diversity Tools
Create Variants
Test Variants
Attack-resistant variants
Attack description
Feedback
Cognitive Immunity and Self-Healing
- Monitoring After the variants are created,
their resistance to attacks is evaluated - Learning-Based Diagnosis The winning variants
are stored in a KED, while the losing variants
are marked as such or discarded - Regenerative Actuation The winning variants are
used to increase system robustness by replacing
vulnerable components, possibly by a Cognitive
component or system
9Comparison of Diversity Projects
Genesis creates variants at multiple levels
compilation, linking, loading, run-time
Dawson creates variants from binary for Windows
platforms
Create Variants
Test Variants
Create Variants
Test Variants
Attack-resistant variants
Attack-resistant variants
Attack description
Attack description
Cognitive Immunity and Self-Healing
Cognitive Immunity and Self-Healing
10Summary of Diversity Projects
- Genesis generates program variants from source
using techniques such as Calling Sequence
Diversity and Instruction Set Randomization - DAWSON generates program variants from binary for
the Windows environment using techniques such as
variable location (stack/heap) randomization and
address (DLL/IAT) randomization
11RSRS Architecture applied to Redundancy Area
12Summary of Redundancy Area
- Steward (SAIIA) provides intrusion-tolerant
objects over wide-area networks - IITSR focuses on Byzantine-tolerant data/object
replication - QuickSilver considers scalable and reliable
mechanisms, e.g. group multicast and event
dissemination - Projects are primarily focused on performance (as
called for in BAA) but do not investigate
internal self-regeneration or reconfiguration
(static fault tolerance is provided, in general) - Opportunities exist to extend existing projects
to provide self-regenerative redundant
components, which could provide building blocks
for larger self-regenerative systems, e.g. a
self-regenerative replicated data store or
self-regenerative objects - Scalable event dissemination and processing is
critical for RSRS architecture
13RSRS Architecture applied to Insider Area
Reasoning About Insider Threats
Monitor activities
Control operator scope
Learn/ refine model
Cognitive Immunity and Self-Healing
14Comparison of Insider Projects
High Dimensional Search/Monitoring
PMOP
HD search engine
repository
Danger/ Malicious
behavior monitor
assess harm/intent
operating model
Response engine
Send harmful action for remediation
Normal/error
Restrict privileges
Refine Model
Potential action
Cognitive Immunity and Self-Healing
Cognitive Immunity and Self-Healing
15Summary of Insider Area
- PMOP uses a model-based approach
- HDSM uses a model-based approach to represent
insider knowledge acquisition and
high-dimensional search techniques for
identifying suspicious activity from large sensor
network output - High-dimensional search is a candidate for
learning-based diagnosis for large complex
systems
16Summary of Findings
- All SRS program areas fit well within RSRS
architecture concept - More work is needed on cognitive approaches for
large complex systems - Examples of critical technologies for RSRS
scalable and reliable event dissemination/processi
ng, high-dimensional search, biodiversity
generators - Opportunities exist to develop self-regenerative
building-block components from some of the SRS
technologies
17Part 2 Moving Forward
18RSRS Structural Architecture for Complex System
Control Plane
Self-regenerative Data Store (optional)
Software Components
SRS Commands
A
A
A
A
Cognitive/ Reflective System Manager
System Status Info
Detectors, e.g. IDS and Failure Detectors
Multicast
L
L
L
L
M
M
M
M
D
D
D
A
Application Group
L
Network of Virtual Sensors
High-dimensional search
Event Disseminator
M
19RSRS Structural Architecture for System of
Systems
Global Event Disseminator
20Military Data/Operations/Command Center
21DCGS Global C4ISR Enterprise
22Time-Critical Targeting (TCT)
- Executed within Air Operations Centers
- Time-sensitive target with limited window of
opportunity - Tasks find, fix, track, target, engage, and
assess - Applications intelligence preparation, terrain
analysis, target development/nomination,
weapon-target pairing
23RSRS Scenario with TCT and DCGS
- TCT tasks are underway when a non-critical
display application reports a data structure
corruption event the data structure is
automatically repaired and the application
continues a few minutes later, another
corruption is reported and repaired, although the
application is forced to display at a lower
resolution - The RSRS cognitive/reflective component queries
DCGS event streams for recent reports and notes
that a larger-than-expected number of workstation
crashes have occurred over the last 15 minute
period - The cognitive/reflective component then receives
a report of errors from a replica, which is
running a critical TCT task and is hosted on the
same workstation as the display application
24RSRS Scenario, continued
- A short time later, the workstation hosting the
replica and display application crashes - Critical applications use reconfigurable objects,
so the system automatically starts a new replica
on another workstation - The RSRS high-dimensional search module is
activated to analyze recent log and other event
data within the Operations Center - The search reveals unusual activity on the
Operations Center gateway and a connection from
the gateway to the crashed machine via a
rarely-used port shortly before data corruption
began
25RSRS Scenario, continued
- The cognitive/reflective component also notes
that the application using the port is on the
list of applications that interact with the
display application - The RSRS actuator takes the following actions
- It disseminates its analysis results (suspected
application and port) to all other
data/command/operations centers via DCGS - It temporarily disconnects the Operations Center
from DCGS and shuts down the gateway - It reboots the failed workstation and disables
the suspected application and port on all
workstations
26RSRS Scenario, continued
- Another data center, after seeing the Operations
Center report, is able to capture and analyze the
attack - The attack info is then used by a bio-diversity
generator to create a resistant variant of the
targeted application, which it distributes to
other centers via DCGS - Once the TCT operation is completed, RSRS
reconnects the Operations Center to DCGS,
receives and installs the new variant on all
machines, and reopens the closed ports
27Use of SRS Technologies in RSRS
- Learn/Repair self-regeneration within software
components, monitoring and event generation - Cognitive model-based approaches
self-regeneration within embedded systems, e.g.
UAVs, or single applications - Cortex self-regenerating databases
- Dawson, Genesis generation of resistant software
variants
28Use of SRS Technologies in RSRS
- HDSM Analysis of event streams containing
diverse event types and widely varying
granularities and time scales - SAIIA object replication, reconfigurable and/or
self-regenerating objects? - IITSR data replication, reconfigurable and/or
self-regenerating data stores? - QuickSilver robust communication within the data
center event dissemination and filtering within
the data center and across enterprise
29RSRS Architecture - Next Steps
- Integrate SRS technologies
- Architect cognitive reflective component
- Study how existing systems can be integrated with
RSRS architecture, e.g. using wrappers and
external monitors - Apply RSRS to complex system and demonstrate
successful self-regeneration in scenario like TCT
or alternative