Incident 216 illustrates the situation faced by collaborative computing sites: their security measures and mechanisms are sufficient to allow them to maintain an acceptable operational state, however extreme situations overwhelm these security measures and mechanisms leaving the sites unable to maintain their integrity. A natural reaction to this situation is to raise the level of security at sites to higher levels that would be sufficient to provide protection from Incident 216-like attackers. This is akin to establishing a security perimeter around a hazardous area and allow only limited, authorized personnel to enter the area to respond to the hazard and to enable continuity of essential services. However, as we discuss subsequently, this brings with it significant costs, in terms of both purchasing and supporting new technologies, and decreased usability for users.
The Mithril project focuses on the application of survivability research to standard open source software to allow such sites to continue to operate and serve customers in the face of a extraordinary attack by temporarily and gracefully reducing their level of service but raising their level of security. We will develop a set of integrated security enhancements that not only increases day-to-day security, but also allows dynamic, temporary adaptations in security in response to a heightened level of threat. These enhancements will allow a site to maintain a high-level of openness and usability during normal periods of operation, but respond quickly to increased threat levels with increased security, while still continuing to serve key customers.
Here is a paper which summarizes our accomplishments and insights.
Mithril: An Experiment in Adaptive Security
Mithril is a collaboration between NCSA, PNNL and the NRL Center for Computational Science (CCS). NCSA and PNNL will lead the research and development efforts, with NRL CCS providing requirements and evaluations to ensure applicability of our work to NRL. NCSA will provide over management for the project.
This project is funded by the Office of Naval Research (ONR) grant N0001404-1-0562 through the National Center for Advanced Secure Systems Research Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the view of ONR.