![]() |
![]() Malicious-and Accidental-Fault Tolerance for Internet Applications IST Research Project IST- 1 January 2000 - 28 February 2003 |
|
|
|
|||||||||||||
Key Scientific Results and AchievementsMAFTIA's results and achievements include:
Below is a brief description of the key ideas that underpinned the results of the MAFTIA project, with an emphasis on those areas that illustrate collaboration between partners and integration across disciplines. The MAFTIA deliverables contain full technical details of the work. |
|||||||||||||||
The development of the MAFTIA conceptual model was led by LAAS but involved all the partners. The aim of this work was to develop a unified set of terminology and concepts that brings together ideas from the dependability community, the security community, and the intrusion detection community. In particular, the MAFTIA conceptual model is based on a refinement of the core dependability concepts with respect to malicious faults, and re-interprets traditional approaches to building dependable systems in a security context. It also shows how intrusion detection systems relate to the dependability notions of error detection and fault diagnosis, and develops an integrated framework for building intrusion tolerant systems. [ More... ]
Work on the MAFTIA architecture was led by Lisbon, but again involved most of the partners. The MAFTIA architecture was developed using a number of guiding principles: hybrid failure assumptions, recursive use of fault prevention and fault tolerance techniques, and the notion of trusting components to the extent of their trustworthiness. A crucial aspect of any fault-tolerant architecture is the fault model upon which the system architecture is conceived, and component interactions are defined. MAFTIA is based on a composite fault model with hybrid failure assumptions in which the presence and severity of vulnerabilities, attacks and intrusions varies from component to component. The failure assumptions are in fact enforced by the architecture and the construction of certain trustworthy system components, and thus substantiated. [ More... ]
Within the context of the MAFTIA conceptual model and architecture, a number of mechanisms and protocols for building intrusion tolerant applications and services were developed by IBM, Lisbon, LAAS and Newcastle. These depend on the notion of distributing trust so as to avoid placing too much trust in any one component of the system. By its very nature, intrusion tolerance requires a "defence in depth" approach, and there can be no single point of failure. However, one of the difficulties that has to be overcome in designing such mechanisms is avoiding the apparent conflict between reliability and secrecy - naïve replication of secrets makes it easier for an attacker to breach confidentiality. [ More... ]
The verification and assessment work within MAFTIA was largely performed by Saarland and QinetiQ, but involved close collaboration with other partners whose protocols and mechanisms were being verified, notably IBM and Lisbon. The goals of the verification and assessment work were three-fold:
[ More... ]
The broad area of security and trustworthiness is increasingly seen as being vital for the success of the Information Society. As a pioneering project in the field of intrusion tolerance, MAFTIA has already been very visible in the scientific community, and has made major contributions to a number of EU/US collaboration workshops in the general area of dependability and survivability. Some of the results from IBM's work on improving the quality of intrusion detection systems have already found their way into products, and a number of patents have been taken out. Several of the MAFTIA partners are actively seeking collaboration with industry to develop their research prototypes further, and the longer term research agenda will be carried forward in a number of research proposals submitted to FP6 by members of the MAFTIA consortium. |
|