120 likes | 248 Views
Security in an Autonomic Computing Environment. Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation by: Justin Moles. The problem. The main obstacle to further progress in IT industry Not a change in Moore’s law, but Looming software complexity crisis
E N D
Security in an Autonomic Computing Environment Paper by: D. M. Chess, C. C. Palmer S. R. White Presentation by: Justin Moles
The problem • The main obstacle to further progress in IT industry • Not a change in Moore’s law, but • Looming software complexity crisis • Beyond admin single environments, to integration into intra- and inter-corporate computing systems “Complexity is the business we are in, and complexity is what limits us.”, Fred Brooks Jr. • Better programming won’t do it • Consider • ~1/3 to ½ of a company’s total IT budget goes to preventing and recovering from crashes • “For every dollar to purchase storage, you spend $9 to have someone manage it.”, N. Tabellion, CTO Fujitsu Softek • ~40% of computer outages are caused by operator errors • Average downtime impact for IT ~ $1.4 millions revenue/hour
The answer/hope – Autonomic computing • Autonomic systems – can manage themselves given high-level objectives from admins. ~ autonomic nervous system • An autonomic system • Knows itself • Knows its environment & the context surrounding its activity • (Re) configure itself under varying and unpredictable conditions • Is always on the look to optimize its working • Is able to protect and heal itself • Anticipates the optimized resources needed to meet a user’s information needs • To incorporate these characteristics, it must have the following properties/features …
Self-* properties • Self-configuration • Current: Data centers made of components from/for multiple vendors/platforms; installation, configuration & integration is time consuming & error prone • Autonomic: Automated based high-level policies, host system adjust itself automatically and seamlessly • Self-optimization • Current: Hundreds of manually set, nonlinear tuning knobs • Autonomic: Components and system continually seek optimization opportunities • Self-healing • Current: e.g. problem determination can take weeks • Autonomic: self detection, diagnosis, and repair for HW&SW • Self-protection • Current: Detection & recovery from attacks & cascading failures is manual • Autonomic: Self-defense using early warning to anticipate & prevent system-wide failures
Autonomic Architecture • Combination of Autonomic Elements with Non-Autonomic Elements • Autonomic Management Units • Non-Autonomic Functional Units
Autonomic Security Elements • High level security policies from System Admins • Functional security elements – encryption, decryption, monitoring, analysis etc. • Task and State Representations • Configuration security
Issues Relevant in Autonomic Security • Every issue currently relevant in computer security will continue to be so • In addition new threats from autonomic elements will be added to the list • Viruses and worms could be adapted to use autonomic elements for reproduction • In addition the efficiency gained from autonomic elements can assist attackers as well as defenders
Autonomic Information Control • Perhaps biggest issue for autonomic elements is informational control • Certain elements have access to certain information – no more and no less • Need to have a manageable interface to control this control is a key issue in computer security • Added to this is privacy laws that often differ by country
Trust, Authorization, and Verification • With autonomic elements able to set configuration settings, verification of their authority in a complex environment becomes important. • Some elements will also be able to install new elements on their authority which will need to be checked for security • Doing this for multiple elements can add up in cost and needs to be controlled and understood to increase the efficiency of the process
Other examples • Immune System – Antivirus software, antispyware software, and more rolled into one • Secure Distributed Storage – Information is spread across several well protected units across the world, able to retrieved on notice.
Conclusion and My Opinion • Autonomic system will make security even more important than it is currently • However the potential exists for greater levels of security than before • Overall the paper is a “Vision” paper full of concepts with no data within it.