Fault and Intrusion Tolerance in Open Distributed Systems (FIT)

From Navigators

(Difference between revisions)
Jump to: navigation, search
Line 2: Line 2:
|Acronym=FIT
|Acronym=FIT
|Name=Fault and Intrusion Tolerance in Open Distributed Systems
|Name=Fault and Intrusion Tolerance in Open Distributed Systems
 +
|Leadership=Nuno Ferreira Neves
|Core members=Alysson Bessani, Fernando Ramos, Paulo Verissimo,
|Core members=Alysson Bessani, Fernando Ramos, Paulo Verissimo,
|Objectives=This line of research investigates models, protocols and architectures, that are suitable for applications with strong dependability requirements, namely applications that need to remain operational despite accidental faults or malicious attacks. One of the main challenges that we are currently addressing is the development of "intrusion-tolerance" mechanisms where, instead of preventing attacks from penetrating the system, we intend to be able to detect and recover from intrusions automatically. The kind of environments that are being contemplated include Internet-based distributed applications with large and heterogeneous populations, mobile networks and computing with small hand-held devices, scalable servers either supporting distributed transactions or parallel processing, and critical infrastructures.
|Objectives=This line of research investigates models, protocols and architectures, that are suitable for applications with strong dependability requirements, namely applications that need to remain operational despite accidental faults or malicious attacks. One of the main challenges that we are currently addressing is the development of "intrusion-tolerance" mechanisms where, instead of preventing attacks from penetrating the system, we intend to be able to detect and recover from intrusions automatically. The kind of environments that are being contemplated include Internet-based distributed applications with large and heterogeneous populations, mobile networks and computing with small hand-held devices, scalable servers either supporting distributed transactions or parallel processing, and critical infrastructures.

Revision as of 13:16, 10 December 2014


Core members

Objectives

This line of research investigates models, protocols and architectures, that are suitable for applications with strong dependability requirements, namely applications that need to remain operational despite accidental faults or malicious attacks. One of the main challenges that we are currently addressing is the development of "intrusion-tolerance" mechanisms where, instead of preventing attacks from penetrating the system, we intend to be able to detect and recover from intrusions automatically. The kind of environments that are being contemplated include Internet-based distributed applications with large and heterogeneous populations, mobile networks and computing with small hand-held devices, scalable servers either supporting distributed transactions or parallel processing, and critical infrastructures.

Projects

Current projects

  • VEDLIoT (Very Efficient Deep Learning in IOT)
  • ADMORPH (Towards Adaptively Morphing Embedded Systems)
  • SEAL (SEcurity progrAmming of web appLications)
  • UPVN (User-centric Programmable Virtual Networks)
  • REDBOOK (Robust hardwarE-based Defences against Buffer Overflows and Other cybersecurity attacKs)
  • ThreatAdapt (Adaptive Byzantine Fault and Intrusion Tolerance)
  • Xivt (eXcellence In Variant Testing)


Past projects

  • DiSIEM (Diversity-enhancements for Security Information and Event Management)
  • IRCoC (Intelligent Resilience for Cloud-of-Clouds Services)
  • Abyss (Sistemas Autonómicos Tolerantes a Falhas Maliciosas)
  • SUPERCLOUD (User-Centric Management of Security and Dependability in Clouds of Clouds)
  • SEGRID (Security for smart Electricity GRIDs)
  • BioBankCloud (Scalable, Secure Storage of Biobank Data)
  • SecFuNet (Security for Future Networks)
  • SITAN (Services for Intrusion Tolerant Ad Hoc Networks)
  • RC-Clouds (Resilient Computing in the Clouds)
  • TCLOUDS (Trustworthy Clouds: Privacy and Resilience for Internet-scale Critical Infrastructure)
  • MASSIF (MAnagement of Security information and events in Service Infrastructures)
  • TRONE (Trustworthy and Resilient Operations in a Network Environment)
  • CloudFIT (Fault and Intrusion Tolerance for Cloud Computing)
  • DIVERSE (Diversity for Intrusion-Tolerant Systems)
  • REGENESYS (Regeneration of Replicated Systems)
  • FTH-Grid (Fault-Tolerant Hierarchical Grid Scheduling)
  • RESIST NoE (Resilience for Survivability in IST (Network of Excellence))
  • CRUTIAL (CRitical UTility InfrastructurAL resilience)
  • AJECT (Attack Injection on Software Components)
  • RITAS (Randomized Intrusion Tolerance for Asynchronous Systems)
  • … further results
Personal tools
Navigators toolbox