z-logo
open-access-imgOpen Access
AWDRAT: A Cognitive Middleware System for Information Survivability
Author(s) -
Shrobe Howard,
Laddaga Robert,
Balzer Bob,
Goldman Neil,
Wile Dave,
Tallis Marcelo,
Hollebeek Tim,
Egyed Alexander
Publication year - 2007
Publication title -
ai magazine
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.597
H-Index - 79
eISSN - 2371-9621
pISSN - 0738-4602
DOI - 10.1609/aimag.v28i3.2056
Subject(s) - survivability , middleware (distributed applications) , computer science , hacker , computer security , process (computing) , software , visibility , software engineering , intrusion detection system , variety (cybernetics) , software system , distributed computing , artificial intelligence , operating system , computer network , physics , optics
The infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by “recreational hackers” have already led to severe disruptions and significant cost. It, therefore, is critical that we find ways to protect such systems and to enable them to continue functioning even after a successful attack. This article describes AWDRAT, a prototype middleware system for providing survivability to both new and legacy applications. AWDRAT stands for architectural differencing, wrappers, diagnosis, recovery, adaptive software, and trust modeling. AWDRAT uses these techniques to gain visibility into the execution of an application system and to compare the application's actual behavior to that which is expected. In the case of a deviation, AWDRAT conducts a diagnosis that determines which computational resources are likely to have been compromised and then adds these assessments to its trust model. The trust model in turn guides the recovery process, particularly by guiding the system in its choice among functionally equivalent methods and resources.AWDRAT has been applied to and evaluated on an example application system, a graphical editor for constructing mission plans. We describe a series of experiments that were performed to test the effectiveness of AWDRAT in recognizing and recovering from simulated attacks, and we present data showing the effectiveness of AWDRAT in detecting a variety of compromises to the application system (approximately 90 percent of all simulated attacks are detected, diagnosed, and corrected). We also summarize some lessons learned from the AWDRAT experiments and suggest approaches for comprehensive application protection methods and techniques.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here