PDL PROJECTS

SELF SECURING DEVICES

Contact: Greg Ganger

Better Security via Smarter Devices

Security compromises are a fact of life with crackers, e-mail viruses, self-propagating worms, and DoS attacks. Since no single defense is adequate, security functionality should be distributed among physically distinct components. Inspired by siege warfare, individual devices erect their own security perimeters and defend their own critical resources (e.g., network link or storage media).

Together with conventional OS and firewall defenses, such self-securing devices promise greater flexibility for security administrators dealing with intrusions. By having each device erect an independent security perimeter, the network environment gains many outposts from which to act when under attack. Devices not only protect their own resources, but they can observe, log,
and react to the actions of other nearby devices. Infiltration of one security perimeter will compromise only a small fraction of the environment -- other devices can work to dynamically identify the problem, alert still-secured devices about the compromised components, raise the security levels of the environment, and so forth.

More Information

People

FACULTY

Greg Ganger
David Nagle

STAFF

Stan Bielski
Gregg Economou

STUDENTS

Garth Goodson
John Griffin
Andy Klosterman
Chris Lumb
Adam Pennington
Jiri Schindler
Craig Soules
John Strunk

Publications


SELF SECURING DEVICES

SELF SECURING STORAGE

SELF SECURING NICS

BIOMETRIC-ENHANCED AUTHENTICATION

Acknowledgements

This material is based on research sponsored by the Air Force Research Laboratory, under agreement number F49620-01-1-0433. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Air Force Research Laboratory or the U.S. Government.

We thank the members and companies of the PDL Consortium: Actifio, American Power Conversion, EMC Corporation, Facebook, Fusion-io,Google, Hewlett-Packard Labs, Hitachi, Huawei Technologies Co., Intel Corporation, Microsoft Research, NEC Laboratories, NetApp, Inc., Oracle Corporation, Panasas, Samsung Information Systems America, Seagate Technology, Symantec Corporation, VMware, Inc., and Western Digital for their interest, insights, feedback, and support.

^TOP

 

 

© 2014. Last updated 4 May, 2012