Synopses & Reviews
THESE PAGES SUMMARIZE FIVE YEARS OF EXTENSIVE RESEARCH.
Traditional information security methods are no longer adequate to protect critical infrastructures. The Department of Defense has funded extensive university research into enhanced security methods and technology, and this book highlights some of the most significant findings of this program. These articles and analyses offer high-value, leading-edge techniques and solutions for the future of information security.
- Learn to build in "smart" security at every level of a network, from individual computer components to the highest echelons of network control
- Use guarding techniques that allow individual components to recognize when their own behaviors are degrading and automatically shut down
- Apply improved analysis methods to validate code more extensively
- Discover new approaches to creating and using mobile code that's harder to break
- Create a Java environment that makes bogus code easier to detect and block
- Explore software that can automatically recognize suspicious sequences and apply key security policies
Synopsis
This is the first and only publication describing new methods for creating better security technologies, direct from the Department of Defense and its $80,000,000, five-year massive and classified security project. Organized by topic and written in language accessible to a general technical reader, the book presents the best methods, proven and tested over five years, with introductions to related groups of projects provided by the Program Managers who oversaw the research for that topic area. It also features an introductory section, written by various program managers for the DoD, which explains why traditional security techniques are not adequate to meet terrorist threats and which new methods will meet particular corporate and industry network needs.
Synopsis
- After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks
- Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five years
- An intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needs
- Discusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
About the Author
In 2001, the Director of Defense research and Engineering in the Office of the Secretary of Defense initiated an $80 million, five-year research program at U.S. universities in critical infrastructure protection and high confidence adaptable software. Managed by the Department of Defense science offices, these projects produced the results summarized here.
Table of Contents
Foreword.
Acknowledgements.
Introduction (Steven King).
Chapter 1. Architecting Information Infrastructures for Security (Cliff Wang).
1.1 Architectures for Secure and Robust Distributed Infrastructures.
1.2 A complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure.
1.3 Anomaly and Misuse Detection in Network Traffic Streams-Checking and Machine Learning Approaches.
1.4 Distributed Systems Security via Logical Framework.
1.5 Distributed Immune Systems for Wireless Networks Information Assurance.
1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis.
Chapter 2. At the Edges of the Critical Information Infrastructure (David Hislop, Todd Combs).
2.1 Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security.
2.2 Software Model Checking for Embedded Systems.
2.3 Advanced tool Integration for Embedded System Assurance.
2.4 Verification Tools for Embedded Systems.
Chapter 3. Software Engineering for Assurance (Ralph Wachter, Gary Toth).
3.1 Static Analysis to Enhance toe Power of Model Checking for Concurrent Software.
3.2 Protecting COTS from the Inside.
3.3 RAPIDware: Component-Based Development of Adaptive and Dependable Middleware.
3.4 Generating Efficient Trust Management Software from Policies.
3.5 Modeling and Simulation Environment for Critical Information Protection.
Chapter 4. Malicious Mobile Code (Ralph Wachter, Gary Toth).
4.1 Language-Based Security for Malicious Mobile Code.
4.2 Model-Carrying Code: A New Approach to Mobile-Code Security.
4.3 Neutralizing Malicious Mobile Code.
Chapter 5. Dependable Critical Information Infrastructure for Command and Control (Robert Herklotz, Chris Arney).
5.1 Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing.
5.2 Adaptable Situation-Aware Secure Services-Based Systems.
5.3 Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools.
5.4 Vulnerability Assessment Tools for Complex Information Networks.