Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John D. Strunk is active.

Publication


Featured researches published by John D. Strunk.


IEEE Computer | 2000

Survivable information storage systems

Jay J. Wylie; Michael W. Bigrigg; John D. Strunk; Gregory R. Ganger; Han Kiliccote; Pradeep K. Khosla

As society increasingly relies on digitally stored and accessed information, supporting the availability, integrity and confidentiality of this information is crucial. We need systems in which users can securely store critical information, ensuring that it persists, is continuously accessible, cannot be destroyed and is kept confidential. A survivable storage system would provide these guarantees over time and despite malicious compromises of storage node subsets. The PASIS architecture flexibly and efficiently combines proven technologies (decentralized storage system technologies, data redundancy and encoding, and dynamic self-maintenance) for constructing information storage systems whose availability, confidentiality and integrity policies can survive component failures and malicious attacks.


measurement and modeling of computer systems | 2006

Stardust: tracking activity in a distributed storage system

Eno Thereska; Brandon Salmon; John D. Strunk; Matthew Wachs; Michael Abd-El-Malek; Julio Lopez; Gregory R. Ganger

Performance monitoring in most distributed systems provides minimal guidance for tuning, problem diagnosis, and decision making. Stardust is a monitoring infrastructure that replaces traditional performance counters with end-to-end traces of requests and allows for efficient querying of performance metrics. Such traces better inform key administrative performance challenges by enabling, for example, extraction of per-workload, per-resource demand information and per-workload latency graphs. This paper reports on our experience building and using end-to-end tracing as an on-line monitoring tool in a distributed storage system. Using diverse system workloads and scenarios, we show that such fine-grained tracing can be made efficient (less than 6% overhead) and is useful for on- and off-line analysis of system behavior. These experiences make a case for having other systems incorporate such an instrumentation framework.


darpa information survivability conference and exposition | 2001

Survivable storage systems

Gregory R. Ganger; Pradeep K. Khosla; Mehmet Bakkaloglu; Michael W. Bigrigg; Garth R. Goodson; Semih Oguz; Vijay Pandurangan; Craig A. N. Soules; John D. Strunk; Jay J. Wylie

Survivable storage systems must maintain data and access to it in the face of malicious and accidental problems with storage servers, interconnection networks, client systems and user accounts. These four component types can be grouped into two classes: server-side problems and client-side problems. The PASIS architecture addresses server-side problems, including the connections to those servers, by encoding data with threshold schemes and distributing trust amongst sets of storage servers. Self-securing storage addresses client and user account problems by transparently auditing accesses and versioning data within each storage server. Thus, PASIS clients use threshold schemes to protect themselves from compromised servers, and self-securing servers use full access auditing to protect their data from compromised clients. Together, these techniques can provide truly survivable storage systems.


Operating Systems Review | 2006

InteMon: continuous mining of sensor data in large-scale self-infrastructures

Evan Hoke; Jimeng Sun; John D. Strunk; Gregory R. Ganger; Christos Faloutsos

Modern data centers have a large number of components that must be monitored, including servers, switches/routers, and environmental control systems. This paper describes InteMon, a prototype monitoring and mining system for data centers. It uses the SNMP protocol to monitor a new data center at Carnegie Mellon. It stores the monitoring data in a MySQL database, allowing visualization of the time-series data using a JSP web-based frontend interface for system administrators. What sets InteMon apart from other cluster monitoring systems is its ability to automatically analyze correlations in the monitoring data in real time and alert administrators of potential anomalies. It uses efficient, state of the art stream mining methods to report broken correlations among input streams. It also uses these methods to intelligently compress historical data and avoid the need for administrators to configure threshold-based monitoring bands.


Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems] | 2003

Self-securing storage: protecting data in compromised systems

John D. Strunk; Garth R. Goodson; Michael L. Scheinholtz; Craig A. N. Soules; Gregory R. Ganger

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep old versions of data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators have this valuable information for intrusion diagnosis and recovery. Our implementation, called S4, combines log-structuring with journal-based metadata to minimize the performance costs of comprehensive versioning. Experiments show that self-securing storage devices can deliver performance that is comparable with conventional storage systems. In addition, analyses indicate that several weeks worth of all versions can reasonably be kept on state-of-the-art disks, especially when differencing and compression technologies are employed.


ACM Transactions on Information and System Security | 2010

Storage-Based Intrusion Detection

Adam G. Pennington; John Linwood Griffin; John S. Bucy; John D. Strunk; Gregory R. Ganger

Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions. Storage systems can spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. For example, examination of 18 real intrusion tools reveals that most (15) can be detected based on their changes to stored files. Further, an Intrusion Detection System (IDS) embedded in a storage device continues to operate even after client operating systems are compromised. We describe and evaluate a prototype storage IDS, built into a disk emulator, to demonstrate both feasibility and efficiency of storage-based intrusion detection. In particular, both the performance overhead (< 1%) and memory required (1.62MB for 13995 rules) are minimal.


data management for sensor networks | 2006

Intelligent system monitoring on large clusters

Jimeng Sun; Evan Hoke; John D. Strunk; Gregory R. Ganger; Christos Faloutsos

Modern data centers have a large number of components that must be monitored, including servers, switches/routers, and environmental control systems. This paper describes InteMon, a prototype monitoring and mining system for data centers. It uses the SNMP protocol to monitor a new data center at Carnegie Mellon. It stores the monitoring data in a MySQL database, allowing visualization of the time-series data using a JSP web-based frontend interface for system administrators. What sets InteMon apart from other cluster monitoring systems is its ability to automatically analyze correlations in the monitoring data in real time and alert administrators of potential anomalies. It uses efficient, state of the art stream mining methods to report broken correlations among input streams. It also uses these methods to intelligently compress historical data and avoid the need for administrators to configure threshold-based monitoring bands.


operating systems design and implementation | 2000

Self-securing storage: protecting data in compromised system

John D. Strunk; Garth R. Goodson; Michael L. Scheinholtz; Craig A. N. Soules; Gregory R. Ganger


file and storage technologies | 2003

Metadata Efficiency in Versioning File Systems

Craig A. N. Soules; Garth R. Goodson; John D. Strunk; Gregory R. Ganger


file and storage technologies | 2005

Ursa minor: versatile cluster-based storage

Michael Abd-El-Malek; William V. Courtright Ii; Charles D. Cranor; Gregory R. Ganger; James Hendricks; Andrew J. Klosterman; Michael P. Mesnier; Manish Prasad; Brandon Salmon; Raja R. Sambasivan; Shafeeq Sinnamohideen; John D. Strunk; Eno Thereska; Matthew Wachs; Jay J. Wylie

Collaboration


Dive into the John D. Strunk's collaboration.

Top Co-Authors

Avatar

Gregory R. Ganger

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brandon Salmon

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew Wachs

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge