Intrusion-tolerant server architecture for survivable services

被引:0
|
作者
Min, YJ [1 ]
机构
[1] Univ Incheon, Dept Comp Sci & Engn, Inchon 402749, South Korea
来源
JOURNAL OF SUPERCOMPUTING | 2005年 / 33卷 / 1-2期
关键词
survivability; intrusion-tolerance; replicated server architecture; voting;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Survivable systems are increasingly needed in a wide range of applications. As a step toward realizing survivable systems, this paper presents architecture of intrusion-tolerant servers. It is to deliver intended set-vices transparently to the clients even when a computing node fails due to failures, intrusions, and other threats. In order to deliver only secure results to the client, we need an algorithm to decide agreement on results from replicated servers. For this purpose, a secure and practical decentralized voting algorithm for the architecture is proposed in the paper. Through the experiments on a test-bed, especially, for web services, the approach turned out very effective in terms of extra cost and considered to be able to cope with both confidentiality and integrity attacks.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 50 条
  • [1] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    [J]. Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [2] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    [J]. The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [3] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [4] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [5] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03) : 481 - 484
  • [6] SITAR: A scalable intrusion-tolerant architecture for distributed services - A technology summary
    Wang, FY
    Upppalli, R
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 153 - 155
  • [7] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [8] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    [J]. DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
  • [9] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [10] Adaptation policies for web server intrusion-tolerant system
    Im, EG
    In, HP
    Choi, DS
    Song, YH
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3462 - 3465