Seamless Linux-Based Intrusion-Tolerant Networks


Team

Overview

Today’s military command and control and logistics applications require collecting information from and coordinating among many distributed components over IP networks. To ensure that these applications can continue to work, even in the face of sophisticated cyberattacks, it is crucial to construct networks that are resilient to the point of intrusion tolerance, meaning that they are able to work even when part of the network is compromised.

Our prior research has developed techniques to deploy intrusion-tolerant networks on top of existing IP network infrastructure using an overlay concept.

This project addresses two gaps in deploying intrusion-tolerant networks to support mission-critical military applications:

Demonstrations