2000 Project Summary
|Project Website:||Under construction|
|Quad Chart:||Link to Quad Chart|
|Objective:||The goal of the Intrusion Tolerant Server Infrastructure (ITSI) program is to develop a server infrastructure that will provide the support needed to survive malicious attacks. The infrastructure will help reduce intrusions, prevent the propagation of intrusions that do occur, provide automated load shifting between servers when an intrusion is detected, and support automated server recovery.|
|Approach:||The proposed infrastructure consists of two main
Centralized PEN management is provided by the AIC. It is used to define policies for packet filtering, IPSEC and packet redirection; it acts as the interface to other Intrustion Detection and Response systems; it supports anomaly logging and reporting from the PENs; and it directs the response, recovery and restoration activities when an intrustion occurs. The AIC provides a degree of automated recovery from intrusions. The technology will detect corruption, shunt benign users to a redundant server, attempt to automatically restore the corrupted files on the server, and then bring the restored server back online.
|Recent FY-00 Accomplishments:||This project is a FY-00 new start that had its kickoff presentation at the July 2000 DARPA Joint PI meeting.|
|FY-01 Plans:||Develop a Concept of Operations, Architecture
and Design for the ITSI.
Develop an initial prototype.
|Technology Transition:||Technology transition will occur via two routes:
|Principal Investigator:||PI Name
Organization Secure Computing Corporation
Address 2675 Long Lake Road
Roseville, MN 55113
Admin Contact Name Bill