CRUTIAL: CRitical UTility InfrastructurAL resilience
From Navigators
http://crutial.cesiricerca.it/
- Research Line(s): Fault and Intrusion Tolerance in Open Distributed Systems (FIT)
- Sponsor: European Commission - IST Programme
- Project Number: FP6-2004-IST-4-027513
- Total award amount: 2M Euros
- Coordinator: CESI RICERCA SpA
- Partners: CESI, FCUL, CNR-ISTI, CNRS-LASS, KU Leuven, CNIT
- Start Date: Jan. 2006
- Duration: 36 months
- Team at FCUL: Researchers including Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Alysson Bessani, Paulo Sousa, Henrique Moniz, João Antunes
The project addresses new networked ICT systems for the management of the electric power grid, in which artefacts controlling the physical process of electricity transportation need to be connected with information infrastructures, through corporate networks (intranets), which are in turn connected to the Internet.
CRUTIAL's innovative approach resides in modelling interdependent infrastructures taking into account the multiple dimensions of interdependencies, and attempting at casting them into new architectural patterns, resilient to both accidental failures and malicious attacks.
Aims
The objectives of the project are:
- investigation of models and architectures that cope with the scenario of openness, heterogeneity and evolvability endured by electrical utilities infrastructures;
- analysis of critical scenarios in which faults in the information infrastructure provoke serious impacts on the controlled electric power infrastructure;
- investigation of distributed architectures enabling dependable control and management of the power grid.
Approach and Methods
The project will: a) identify and describe control system scenarios; b) provide modelling approaches for understanding and mastering the various interdependencies; c) develop a test bed integrating the electric power system and the information infrastructure; d) investigate fault-tolerant architectural configurations; e) provide qualitative and quantitative support for the identification, analysis and evaluation of the scenarios identified. The results will be validated against test beds of Electric Power Systems.
The project's results will help in designing and assessing new Electric Power systems and information infrastructures. Thus, they will enable to reduce the current (unfortunately repetitive) blackouts, in terms of frequency, duration and extent, and provide insights to Electric Power companies and standardization bodies for exploiting resilience in critical utilities infrastructures.
Publications
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “RITAS: Services for Randomized Intrusion Tolerance”, IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011., Jan. 2011.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery”, IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 452-465, Apr. 2010., Apr. 2010.
- Alysson Bessani, Miguel Correia, Joni Fraga, Lau Cheuk Lung, “An Efficient Byzantine-Resilient Tuple Space”, IEEE Transactions on Computers. Vol. 58 no. 8. pp. 1080-1094. IEEE Computer Society. August 2009., Aug. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Cheap Intrusion-Tolerant Protection for CRUTIAL Things”, Missing institution, Tech. Rep., Aug. 2009. DI-FCUL TR-2009-14
- Paulo Sousa, Alysson Bessani, Wagner Saback Dantas, Fábio Souto, Miguel Correia, Nuno Ferreira Neves, “Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection”, in Proceedings of the 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009), Estoril, Portugal, pp. 217-222, Jun-Jul 2009., Jun. 2009.
- Wagner Saback Dantas, Alysson Bessani, Miguel Correia, “Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks”, in Proceedings of the DSN 2009 5th Workshop on Hot Topics in System Dependability (HotDep 2009), Estoril, Portugal. June 2009., Jun. 2009.
- Alysson Bessani, Miguel Correia, Joni Fraga, Lau Cheuk Lung, “Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces”, IEEE Transactions on Parallel and Distributed Systems. Vol. 20 no. 3. pp. 419-43. IEEE Computer Society. March 2009., Mar. 2009.
- Paulo Verissimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned”, in Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009., Jan. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “The CRUTIAL Way of Critical Infrastructure Protection”, IEEE Security and Privacy, vol. 6, no. 6, pp. 44-51, Nov/Dec 2008., Dec. 2008.
- Alysson Bessani, Hans P. Reiser, Paulo Sousa, I. Gashi, V. Stankovic, T. Distler, R. Kapitza, A. Daidone, Rafael R. Obelheiro, “FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery”, in In Middleware (Companion), Leuven, Belgium, pages 99-101, December 2008., Dec. 2008.
- Eduardo Alchieri, Alysson Bessani, Joni Fraga, Fabíola Greve, “Byzantine Consensus with Unknown Participants”, in Proceedings of the 12th International Conference On Principles Of DIstributed Systems (OPODIS'08). LNCS 5401. Luxor, Egypt., Dec. 2008.
- Hugo Ortiz, Paulo Sousa, Paulo Verissimo, “Towards Intrusion-Tolerant Process Control Software”, in 4th National Conference on Segurança Informática nas Organizações (SINO 2008), Coimbra, Portugal, October 2008., Oct. 2008.
- Eduardo Alchieri, Alysson Bessani, Joni Fraga, “A Dependable Infrastructure for Cooperative Web Services Coordination”, in Proceedings of the 6th IEEE International Conference on Web Services - ICWS 2008, Beijing, China. September 2008., Sept. 2008.
- Miguel Correia, Alysson Bessani, Paulo Verissimo, “On Byzantine Generals with Alternative Plans”, Journal of Parallel and Distributed Computing, Vol. 68, Issue 9, pages 1291-1296, Elsevier., Sept. 2008.
- Paulo Sousa, Alysson Bessani, Rafael R. Obelheiro, “The FOREVER Service for Fault/Intrusion Removal”, in Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2008). Glasgow, UK, April 2008., Apr. 2008.
- Alysson Bessani, Eduardo Alchieri, Miguel Correia, Joni Fraga, “DepSpace: A Byzantine Fault-Tolerant Coordination Service”, in Proceedings of the 3rd ACM/SIGOPS/EuroSys European Systems Conference - EuroSys 2008. Glasgow, Scotland, April 2008., Apr. 2008.
- T. Distler, R. Kapitza, Hans P. Reiser, “Efficient State Transfer for Hypervisor-Based Proactive Recovery”, in Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems (in conjunction with Eurosys 2008, Glasgow, Scotland, April 1, 2008), Apr. 2008.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “The CRUTIAL Reference Critical Information Infrastructure Architecture: A Blueprint”, International Journal of System of Systems Engineering, vol. 1, no. 1/2, pp. 78–95, Jan. 2008.
- Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Resilient Intrusion Tolerance through Proactive and Reactive Recovery”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, pages 373-380, December 2007., Dec. 2007.
- Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo, “On the Effects of Finite Memory on Intrusion-Tolerant Systems”, in The 13th IEEE Pacific Rim International Symposiumon Dependable Computing (PRDC 07), Dec. 2007.
- Wagner Saback Dantas, Alysson Bessani, Joni Fraga, Miguel Correia, “Evaluating Byzantine Quorum Systems”, in In Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS). October 2007., Oct. 2007.
- Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
- Alysson Bessani, Miguel Correia, Joni Fraga, Lau Cheuk Lung, “Decoupled Quorum-based Byzantine-Resilient Coordination in Open Distributed Systems”, in In Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA), pages 231-238, July 2007., Jul. 2007.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Hidden Problems of Asynchronous Proactive Recovery”, in Third Workshop on Hot Topics in System Dependability (HotDep 2007), Edinburgh, UK, Jun. 2007.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.
- Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System”, Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007, Feb. 2007.
- Paulo Sousa, “Proactive Resilience”, in In Sixth European Dependable Computing Conference (EDCC-6) Supplemental Volume. Coimbra, Portugal, pages 27-32, October 2006., Oct. 2006.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, William H. Sanders, “Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, pages 71-80, October 2006., Oct. 2006.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, October 2006, Oct. 2006.
- Fabio Favarim, Lau Cheuk Lung, Joni Fraga, Miguel Correia, “Fault-Tolerant Multiuser Computational Grids based on Tuple Spaces”, in In International Workshop on Dependability in Service-oriented Grids (WODSOG). October 1st, 2006, Leeds, UK, Oct. 2006.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture”, in Proceedings of the 1st International Workshop on Critical Information Infrastructures @ ISC’06, Samos - Greece, August 2006., Aug. 2006.
- Paulo Verissimo, Nuno Ferreira Neves, C. Cachin, J. A. Poritz, D. Powell, Yves Deswarte, R. J. Stroud, I. S. Welch, “Intrusion-Tolerant Middleware: The Road to Automatic Security”, IEEE Security & Privacy, vol. 4, no. 4, pp. 54-62, Jul./Aug. 2006., Aug. 2006.
- Paulo Verissimo, “Thou Shalt Not Trust non-Trustworthy Systems”, Jul. 2006. Keynote at the Workshop on Assurance in Distributed Systems and Networks (ADSN2006), with the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, July 2006.
- Alysson Bessani, Miguel Correia, Joni Fraga, Lau Cheuk Lung, “Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces”, in In Proceedings of the 26th International Conference on Distributed Computing Systems (ICDCS), July 2006., Jul. 2006.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomized Intrusion-Tolerant Asynchronous Services”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, pages 568-577, June 2006, Jun. 2006.
- Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, “Using Attack Injection to Discover New Vulnerabilities”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, June 2006., Jun. 2006.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Proactive Resilience through Architectural Hybridization”, in Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, pages 686-690, April 2006., Apr. 2006.
- G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, Paulo Verissimo, “Critical Utility Infrastructure Resilience”, in In Workshop on Security and Networking in Critical Real-Time and Embedded Systems (CRTES'06), with RTAS'06, San Jose, California, USA, April 2006., Apr. 2006.
- Paulo Verissimo, “Travelling through Wormholes: a new look at Distributed Systems Models”, SIGACT News, vol. 37, no. 1, pages 66-81, 2006., Mar. 2006.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures”, Computer Journal. vol. 41, n. 1, pp 82-96, January 2006., Jan. 2006.
BibTeX
Navigators - CRUTIAL projectCurrent projects: | VEDLIoT, SATO, ADMORPH, SEAL, AQUAMON, UPVN, REDBOOK, ThreatAdapt, SEL, Xivt |
---|---|
Past projects: | TCLOUDS, MASSIF, MAFTIA, RESIST NoE, DiSIEM, KARYON, HIDENETS, CORTEX, CRUTIAL, TRONE, SITAN, ReD, IRCoC, DIVERSE, CloudFIT, READAPT, REGENESYS, RC-Clouds, TACID, DARIO, RITAS, AJECT, MICRA, DEAR-COTS, COPE, DEFEATS, MOOSCO, TOPCOM, RE:DY, NORTH, Abyss, SUPERCLOUD, COST Action IC1402, SEGRID, BioBankCloud, SAPIENT, PROPHECY, SecFuNet, FTH-Grid, AIR-II, AIR, ESFORS, CaberNet, GODC, BROADCAST, CoDiCom, Delta-4, RAPTOR |