DARPA ISO Sponsored Research

2000 Project Summary
Hierarchical Adaptive Control for QoS Intrusion Tolerance (HACQIT)
Teknowledge Corporation

Project Website: 
Not established yet.
Quad Chart: 
Link to Quad Chart   provided by the performing organization
Enable critical users to retain critical functionality provided by COTS/GOTS software and COTS hardware while under coordinated enemy network attack (with an emphasis on denial of service and integrity attacks). Functions can range from traditional human-computer planning type processes to real-time distributed weapon system control processes. Necessary administrative operations such as adding a new user can also continue.
We will utilize robust hierarchical control (based on QoS performance, integrity, and intrusion sensors and fault tolerance and attack stopping mechanisms) to deliver a changing mix of critical COTS and GOTS application services to critical users while under active computer network attack.

We will extend current QoS mechanisms (for migration, fault tolerance, and connection monitoring) developed under Quorum to include integrity monitoring and maintenance. Based on an intrusion resistant architecture, we will install the mechanisms on a cluster of diverse COTS based computers and employ policy driven adaptive control techniques to achieve intrusion tolerance

Our basis for confidence includes:

  • Proven QoS mechanisms for migration and fault tolerance of applications
  • Non-by-passable wrappers and lightweight integrity checking mechanisms are now becoming available out of the DARPA research community to provide integrity monitoring and maintenance
  • An intrusion resistant architecture that features out-of-band signaling and other isolation, checking pointing, and adaptive control mechanisms that migrate processes if their performance or integrity becomes suspect
Recent FY-99 Accomplishments:
This is a new start in July 2000
FY-00 Plans:
During the remainder of this fiscal year, we will do system design, begin work on integrity sensors and adaptive responses, begin component enhancement, and start building the initial prototype
Technology Transition:
First we will identify the military users who most require intrusion tolerant services, the development or acquisition agencies for those users, and the relevant commercial manufacturers or vendors of survivable systems. Then we will utilize a variety of mechanisms (including demonstrations, ongoing communications, publications, and making code available) to create both user pull and technology push among these entities to enhance the adoption rate for our technologies. 
Principal Investigator:
Dr. James E. Just, PI

Teknowledge Corporation
3900 Jermantown Road, Fairfax, VA 22030
Phone 703-352-9300, x218
Fax 703-352-8333
email jjust@teknowledge.com

Prof. Karl Levitt, Subcontractor PI
Organization University of California, Davis
Address Davis, CA
Phone 530-752-0832
Fax 530-752-4767
email levitt@cs.ucdavis.edu

Admin Contact
Victor Frietas
Organization Teknowledge Corporation
Address 1810 Embarcadero Road, Palo Alto, CA 94303
Phone 650-424-0500
Fax 650-493-2645
email vfreitas@teknowledge.com