Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Availability by Design:A Complementary Approach to Denial-of-Service

Abstract

Denial-of-Service (DoS) er betegnelsen for et angreb, der sigter efter at gøre en ressource utilgængelig. DoS angreb på samfundssystemer sker stadig oftere, og de er berygtede på Internettet, hvor de for nylig blev rettet mod store virksomheder. Der er forskellige metoder til at imødegå DoS angreb og nedsætte deres effekt, men mange angreb er alligevel successfulde.Fornyet fokus på tilgængelighed er også påkrævet for systemer, som kaldes Cyber-Physical Systems (CPS’er). CPS’er er store netværk af sensorer og aktuatorer som interagerer med det fysiske miljø. CPSs’er bliver brugt til at bygge vigtig infrastruktur for ledningsnettet, sundhedsvæsenet, færdslen, forsvaret osv. Disse systemer er særligt følsomme overfor til DoS. Foruden de klassiske kommunicationsbaserede angreb, er deres komponenter underlagt fysisk angreb. Ydermere er komponenterne ofte drevet af batterier, og derfor kan de blive utilgængelig for at spare energi og forlænge deres levetid.Formålet med denne afhandling er, at bevise at sprog-baserede teknikker, der har deres rod i det teoretiske og praktiske fundament for programmeringssprog, udgør et samlet udgangspunkt for at klare konsekvenserne af DoS både for utilsigtede årsager og angreb.For at understøtte denne påstand er der udviklet en familie af proceskalkuler, de Quality Calculi, hvor tilgængelighed er et førsteklasses element i domænesproget. Desuden er disse modelleringsprog suppleret med statiske analyser, der kan fastslå hvilke komponeneter kan blive ikke tilgængelig og hvorfor, takket være kalkulernes udtryksfuldhed.Hovedformålet med vores begrebsramme er at støtte udviklingen af systemer som er immune overfor DoS ved hjælp af en styret design process, hvor formelle modeller tillader, og verifikationsværktøjer håndhæver, fremstillingen af sådan robust kode.In computer security, a Denial-of-Service (DoS) attack aims at making a resource unavailable. DoS attacks to systems of public concern occur increasingly and have become infamous on the Internet, where they have targeted major corporations and institutions, thus reaching the general public. There exist various practical techniques to face DoS attacks and mitigate their effects, yet we witness the successfulness of many.The need for a renewed investigation of availability gains in relevance when considering that our life is more and more dominated by Cyber-Physical Systems (CPSs), large-scale network of sensors that interact with the physical environment. CPSs are increasingly exploited in the realisation of critical infrastructure, from the power grid to healthcare, traffic control, and defence applications. Such systems are particularly prone to DoS attacks: in addition to classic communication-based attacks, their components can be subject to physical capture. Moreover, sensors are often powered by batteries, and time-limited unavailability is usually a stage planned to prolong their life span.This dissertation argues that techniques rooted in the theory and practice of programming languages, language-based techniques, offer a unifying framework to deal with the consequences of DoS, thereby encompassing inadvertent and malicious sources of unavailability in a uniform manner.In support to this claim we develop a family of process calculi, the Quality Calculi, where availability considerations are promoted to be first-class object of the language domain. Moreover, these modelling tools are complemented by static analyses that pinpoint where and why unavailability may occur, levering the enhanced expressiveness of the language.The ultimate aim of the framework is to foster the development of systems resilient to DoS by means of a principled design process, in which formal models allow, and verification tools enforce, the production of such robust code.<br/

Similar works

This paper was published in Online Research Database In Technology.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.