A Trustworthiness Detector for Intrusion-Tolerant Group Communication Systems

نویسندگان

  • Soontaree Tanaraksiritavorn
  • Shivakant Mishra
چکیده

A trustworthiness detector in a group communication system raises a suspicion event, whenever one or more group members can no longer be trusted. This suspicion event triggers a group membership protocol to create a new group. This paper describes the design, implementation, and experimental evaluation of a trustworthiness detector that can be incorporated in most group communication systems. The design of this trustworthiness detector is based on two important principles: (1) focusing on observable effects, and (2) detection in depth. This detector is generic in the sense that it is independent of the actual broadcast or group membership protocol being supported by the group communication system. It has been integrated with three different atomic broadcast protocols: a positive acknowledgement-based atomic broadcast protocol, a negative acknowledgement-based atomic broadcast protocol, and a logical ring-based atomic broadcast protocol. The paper describes these implementations, and present an extensive experimental evaluation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Worm-IT - A wormhole-based intrusion-tolerant group communication system

This paper 1 presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusion-tolerant in the sense that it behaves correctly even if some nodes are corrupted and become malicious. It is based on a novel approach that enhances the environment with a special secure distributed component used...

متن کامل

Issues in Building Intrusion Tolerant Group Membership Protocols

Intrusion tolerant group membership protocols constitute an important part of an intrusion-tolerant group communication system. These protocols maintain a consistent system-wide view of correct group members in the presence of malicious failures. The paper provides a detailed analysis and comparison of current, intrusiontolerant group membership protocols, identifies their strengths and weaknes...

متن کامل

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems

Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant micropr...

متن کامل

Experiences with building an intrusion-tolerant group communication system

There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide those properties in the presence of malicious faults resulting from intrusions. We describe the systematic transformation of a crash-tolerant GCS, namely C-Ensemble, ...

متن کامل

Architectures for Intrusion Tolerant Database Systems

In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. With a focus on attacks by malicious transactions, Architecture I can detect ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003