Today’s military command and control and logistics applications require collecting information from and coordinating among many distributed components over IP networks. To ensure that these applications can continue to work, even in the face of sophisticated cyberattacks, it is crucial to construct networks that are resilient to the point of intrusion tolerance, meaning that they are able to work even when part of the network is compromised.
Our prior research has developed techniques to deploy intrusion-tolerant networks on top of existing IP network infrastructure using an overlay concept.
This project addresses two gaps in deploying intrusion-tolerant networks to support mission-critical military applications:
Demonstration of a file copy using the standard SCP program over an intrusion-tolerant network: video
Demonstration of a real-time video transmission over an intrusion-tolerant network. The video traffic is sent from source to destination, and then reflected back to the source (also over the intrusion-tolerant network) to measure the round-trip delay: video