SECURE-RM:SecurityandResourceManagementforDynamicReal-Time Systems BrettTjaden,LonnieWelch,ShawnOstermann,DavidChelberg,RavindraBalupari,Marina Bykova,AaronMitchell,LuTong puterScience,OhioUniversity Athens,Ohio-45701,USA Abstract hasmadereal-putersystemsworld-widevulnerabletoanever-changingarray environmentnewtechniquesmustbedevelopedthatenabledecisionmakerstodetectunusualbehaviorin theirsystems,correlateanomaliesintohigher-levelattackergoals,planappropriateresponseactionsand -RM,binesan intrusiondetectionsystem(INBOUNDS)withadaptiveresourcemanagementmiddleware(DeSiDeRaTa) -based,real-time,hierarchicalsoftwaresystemformisuseand ,suchaspre-attackprobesanddenialofserviceattacks,aredetected andarereportedtoSECURE-RM,whichemploysartificialintelligencetechniquesforderivingimpactsof reallocationbyDeSiDeRaTaforresponseexecution. -RM Figure1depictsanoverviewoftheSECURE-RMarchitecture,whichwillbeusedtodescribeour approachforprovidingsecurityandresourcemanagementfordynamicreal- notifiesSECURE- softwaresystemattributesandthehardwaresystemattributes[1],andinformationaboutthecurrent allocationof(hardware)resourcestothesoftwaresystems[1]toascertaintheadversary’sstrategicgoals. Theresultsoftheanalysisarepresentedtothedecisionmakerintermspertainingtosystemstructure,QoS andmissiongoals. Resource&QoS Monitoring Secure-RM adversary’s strategicgoals, actionadvice, metrics queries re-allocationactions QoS&resource metrics intru sione vents Decision maker Resource Control INBOUNDS: intrusion detectionsvcs. DeSiDeRaTa Figure1–TheArchitectureofSECURE-RM Uponperceptionofanattack,asetofreflexiveactionsisdevelopedbySECURE- developme
检察机关量刑建议制度探析 来自淘豆网www.taodocs.com转载请标明出处.