DEpendability and Security by Enhanced REConfigurability

Summary of the DESEREC 2nd Training Workshop

Live Presentations
[flash player required]

Printable Version Leaflet (1.2MB) [1.2MB]


DESEREC held its second training workshop "Mechanisms for Increasing Dependability through Enhanced Reconfiguration" at INTRACOM S.A. Telecom Solutions in Athens, Greece on 24-25 September, 2007.

The objective of the second training workshop was to raise in-project and public awareness of users to the issues targeted by DESEREC and present the mechanisms and technologies that are developed within the project for increasing the dependability of information systems by monitoring them, making intelligent decisions, and reacting by reconfiguring them. The technical talks were supplemented with demonstrations of tools that are under development within the project.

The second Training Workshop addressed vital topics of system security and dependability as well as engineered mechanisms for enhancing them. Target audience included:

  • Software engineers
  • System security managers/administrators
  • Business service managers
More than 40 individuals participated to the workshop including representatives of the partner institutions, prospective end-users and academia.

The workshop focused on the mechanisms that are still under development within the project as well as targeted solutions for enhancing the dependability of critical information systems. It was structured along two dimensions: modeling and simulation, and monitoring, decision, and reaction mechanisms. The workshop's agenda is presented in the next section, followed by the talk abstracts and the list of workshop advertisement actions pursued by the organizers.


The final version of the agenda was as follows

Monday, 24/09/2007

Session 1: Prelude (THC), 9:30
Overview and objectives of DESEREC (THC)
Autonomous Network Management (ITEA ENERGy project)
Dependable, adaptive mobile applications (HIDENETS project)
Open discussion (moderated)
Dependability and security requirements for Critical Information Systems (SGI)
Introduction to the DESEREC Architecture and Dependability and Security Management (IABG)
Panel discussion (moderated)
Lunch, 12:30
Session 2: Model-based Management of Information Systems (POLITO), 13:30
Introduction to modelling, validating and operation planning in complex information systems (POLITO)
Modelling resources and business services and their security/dependability requirements and properties (POLITO)
Security/dependability analysis of complex information systems: formal verification (IEIIT)
Security/dependability analysis of complex information systems: simulation (PWR)
Simulation of large service oriented systems (TNO)
Creating plans for operating secure and dependable information systems (UMU)
Panel discussion (moderated)
Gala Dinner, 20:30

Tuesday, 25/09/07

Session 3: System reconfiguration (EADS)
Introduction (EADS)
Detection Objectives and Context (THC)
  Detection and Correlation Techniques
  • Rule based correlation techniques (Maite Avelino Carmona, SGI)
  • Anomaly detection through syscall monitoring (Intracom S.A. Telecom Solutions)
  • Anomaly detection and handling (SEARCH)
Dependability metrics (BUTE)
Lunch, 12:30
  Reaction Techniques
    • Fast Reaction and Reconfiguration (EADS)
    • Integration of a security COTS within the DESEREC reconfiguration process (EXAPROTECT)
Panel discussion (moderated)
Session 4: Postlude (THC), 25/09/2007, 15:15
Conclusions (THC)

Workshop Leaflet

Printable Version (1.2MB)