Accession Number:

ADA624054

Title:

Attacking Time

Descriptive Note:

Final rept. Sep 2009-Mar 2015

Corporate Author:

TRUSTEES OF DARTMOUTH COLL HANOVER NH OFFICE OF SPONSORED PROJECTS

Personal Author(s):

Report Date:

2015-06-01

Pagination or Media Count:

36.0

Abstract:

Th e primary goal of this research project was to explore an alternative to conventional network defense based on attacking an adversarys timeliness . This involved devising methods and techniques to increase attacker workload and operate through attacks even if the attacks are never detected. The research has resulted in a new way to structure distributed systems based on a non - deterministic defense-in-depth. This defense combines a series of breakthrough technologies that collectively provide an insurmountable barrier to the tactical viability of Advanced Persistent Threats APTs. The ideas have been incorporated into a clean-slate, proof-of-concept operating system--Bear--that operates on Dell workstations, ARM embedded processors, and large-scale multicore blade--servers.

Subject Categories:

  • Computer Programming and Software
  • Computer Hardware
  • Computer Systems Management and Standards
  • Cybernetics

Distribution Statement:

APPROVED FOR PUBLIC RELEASE