Fault and Intrusion Tolerance in Open Distributed Systems (FIT)

From Navigators

Jump to: navigation, search


Core members

Objectives

This line of research investigates models, protocols and architectures, that are suitable for applications with strong dependability requirements, namely applications that need to remain operational despite accidental faults or malicious attacks. One of the main challenges that we are currently addressing is the development of "intrusion-tolerance" mechanisms where, instead of preventing attacks from penetrating the system, we intend to be able to detect and recover from intrusions automatically. The kind of environments that are being contemplated include Internet-based distributed applications with large and heterogeneous populations, mobile networks and computing with small hand-held devices, scalable servers either supporting distributed transactions or parallel processing, and critical infrastructures.

Projects

Current projects

  • DiSIEM (Diversity-enhancements for Security Information and Event Management)
  • IRCoC (Intelligent Resilience for Cloud-of-Clouds Services)
  • Abyss (Sistemas AutonĂ³micos Tolerantes a Falhas Maliciosas)
  • SUPERCLOUD (User-Centric Management of Security and Dependability in Clouds of Clouds)
  • SEGRID (Security for smart Electricity GRIDs)


Past projects

  • BioBankCloud (Scalable, Secure Storage of Biobank Data)
  • SecFuNet (Security for Future Networks)
  • SITAN (Services for Intrusion Tolerant Ad Hoc Networks)
  • RC-Clouds (Resilient Computing in the Clouds)
  • MASSIF (MAnagement of Security information and events in Service Infrastructures)
  • TRONE (Trustworthy and Resilient Operations in a Network Environment)
  • TCLOUDS (Trustworthy Clouds: Privacy and Resilience for Internet-scale Critical Infrastructure)
  • CloudFIT (Fault and Intrusion Tolerance for Cloud Computing)
  • DIVERSE (Diversity for Intrusion-Tolerant Systems)
  • REGENESYS (Regeneration of Replicated Systems)
  • FTH-Grid (Fault-Tolerant Hierarchical Grid Scheduling)
  • RESIST NoE (Resilience for Survivability in IST (Network of Excellence))
  • CRUTIAL (CRitical UTility InfrastructurAL resilience)
  • AJECT (Attack Injection on Software Components)
  • RITAS (Randomized Intrusion Tolerance for Asynchronous Systems)
  • COPE (Secure and Reliable Parallel Processing)
  • DEFEATS (Distributed Fault and Attack Tolerant Systems Configuration)
  • MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)
  • TOPCOM (Topology-Aware Reliable Group Communication in Geographically Large-Scale Systems)
  • BROADCAST (Basic Research On Advanced Distributed Computing: from Algorithms to SysTems)
  • … further results
Personal tools
Navigators toolbox