Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christopher C. Jones is active.

Publication


Featured researches published by Christopher C. Jones.


IEEE Internet Computing | 2004

Adaptive cyberdefense for survival and intrusion tolerance

Michael Atighetchi; Partha P. Pal; Franklin Webber; Richard E. Schantz; Christopher C. Jones; Joseph P. Loyall

While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.


international conference on distributed computing systems workshops | 2003

Building auto-adaptive distributed applications: the QuO-APOD experience

Michael Atighetchi; Partha P. Pal; Christopher C. Jones; Paul Rubel; Richard E. Schantz; Joseph P. Loyall; John A. Zinky

Exploiting autonomic adaptation in defending a distributed application is a relatively new research area. We describe how the QuO adaptive middleware was used to implement auto-adaptive defenses ranging from simple rapid response sensor-actuator tactics to more sophisticated containment and outrun strategies. In addition, we report on two experiments where live red team attacks were used to evaluate our auto-adaptive defense technology.


network computing and applications | 2003

Adaptive use of network-centric mechanisms in cyber-defense

Michael Atighetchi; Partha P. Pal; Franklin Webber; Christopher C. Jones

Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against network-based attacks is a major focus area in the APOD (Application That Participate in Their Own Defense) project, which set out to develop technologies that increase an applications resilience against cyber attacks. This paper gives an overview of APODs current set of network-level defenses. Specific network-based defense mechanisms are described first, followed by a discussion on how to use them in local defensive behavior. Defense strategies, which specify coordinated defensive behavior across a distributed system, are discussed next, followed by results from initial experimental evaluation.


dependable systems and networks | 2001

Middleware support for voting and data fusion

David E. Bakken; Zhiyuan Zhan; Christopher C. Jones; David A. Karr


Air Force Research Laboratory (Wright-Patterson Air Force Base, Ohio). Information Directorate | 2003

Applications That Participate in Their Own Defense (APOD)

Franklin Webber; Partha P. Pal; Michael Atighetchi; Christopher C. Jones; Paul Rubel


Archive | 2003

Reflections On Evaluating Survivability: The APOD Experiments

Partha P. Pal; Michael Atighetchi; Franklin Webber; Richard E. Schantz; Christopher C. Jones


Archive | 2002

Defense Enabling Using QuO: Experience in Building Survivable CORBA Applications

Christopher C. Jones; Partha P. Pal; Franklin Webber


Archive | 2001

Systems and methods for voting on multiple messages

David E. Bakken; David A. Karr; Christopher C. Jones


Archive | 2005

Intrusion Tolerance By Unpredictable Adaptation (ITUA)

Partha P. Pal; Michael Atighetchi; Christopher C. Jones; Idit Keidar; David Levin; Joseph P. Loyall; Paul Rubel; Richard E. Schantz; Ronald Watro; Franklin Webber


Archive | 2001

Procédé et système d'élection parmi plusieurs messages

David E. Bakken; David A. Karr; Christopher C. Jones

Collaboration


Dive into the Christopher C. Jones's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David E. Bakken

Washington State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge