Experiences with building an intrusion-tolerant group communication system
نویسندگان
چکیده
There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide those properties in the presence of malicious faults resulting from intrusions. We describe the systematic transformation of a crash-tolerant GCS, namely C-Ensemble, into an intrusion-tolerant GCS, the ITUA GCS. To do the transformation, we devised intrusion-tolerant versions of key group communication protocols. We then inserted implementations of the protocols into C-Ensemble and made significant changes to the rest of the C-Ensemble protocol stack to make the stack intrusion-tolerant. We quantify the cost of providing intrusiontolerant group communication in two ways. First, we quantify the implementation effort by presenting a detailed analysis of the amount of change required to the original C-Ensemble system. In doing so, we provide insight into the choice of building an intrusion-tolerant GCS from scratch versus building one by leveraging a crashtolerant implementation. Second, we quantify the run-time performance cost of tolerating intrusions by presenting results from an experimental evaluation of the main intrusiontolerant microprotocols. The results are analyzed to identify the parts that contribute the most overhead while providing intrusion tolerance during both normal operation and recovery from intrusions.
منابع مشابه
Issues in Building Intrusion Tolerant Group Membership Protocols
Intrusion tolerant group membership protocols constitute an important part of an intrusion-tolerant group communication system. These protocols maintain a consistent system-wide view of correct group members in the presence of malicious failures. The paper provides a detailed analysis and comparison of current, intrusiontolerant group membership protocols, identifies their strengths and weaknes...
متن کاملWorm-IT - A wormhole-based intrusion-tolerant group communication system
This paper 1 presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusion-tolerant in the sense that it behaves correctly even if some nodes are corrupted and become malicious. It is based on a novel approach that enhances the environment with a special secure distributed component used...
متن کاملGroup Communication Protocols and a Framework for Intrusion-Tolerant Distributed Applications
We present an overview of a suite of protocols for practical intrusion-tolerant group communication. The protocols are very efficient in the normal case of no faults, are reasonably efficient even when faults occur, provide strong reliability guarantees, and operate under realistic timing assumptions. The protocol suite will be implemented in a reusable, reconfigurable, and portable framework c...
متن کاملQuantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems
Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant micropr...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Softw., Pract. Exper.
دوره 38 شماره
صفحات -
تاریخ انتشار 2008