A Trustworthiness Detector for Intrusion-Tolerant Group Communication Systems
نویسندگان
چکیده
A trustworthiness detector in a group communication system raises a suspicion event, whenever one or more group members can no longer be trusted. This suspicion event triggers a group membership protocol to create a new group. This paper describes the design, implementation, and experimental evaluation of a trustworthiness detector that can be incorporated in most group communication systems. The design of this trustworthiness detector is based on two important principles: (1) focusing on observable effects, and (2) detection in depth. This detector is generic in the sense that it is independent of the actual broadcast or group membership protocol being supported by the group communication system. It has been integrated with three different atomic broadcast protocols: a positive acknowledgement-based atomic broadcast protocol, a negative acknowledgement-based atomic broadcast protocol, and a logical ring-based atomic broadcast protocol. The paper describes these implementations, and present an extensive experimental evaluation.
منابع مشابه
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper 1 presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusion-tolerant in the sense that it behaves correctly even if some nodes are corrupted and become malicious. It is based on a novel approach that enhances the environment with a special secure distributed component used...
متن کاملIssues in Building Intrusion Tolerant Group Membership Protocols
Intrusion tolerant group membership protocols constitute an important part of an intrusion-tolerant group communication system. These protocols maintain a consistent system-wide view of correct group members in the presence of malicious failures. The paper provides a detailed analysis and comparison of current, intrusiontolerant group membership protocols, identifies their strengths and weaknes...
متن کاملQuantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems
Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant micropr...
متن کاملExperiences with building an intrusion-tolerant group communication system
There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide those properties in the presence of malicious faults resulting from intrusions. We describe the systematic transformation of a crash-tolerant GCS, namely C-Ensemble, ...
متن کاملArchitectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. With a focus on attacks by malicious transactions, Architecture I can detect ...
متن کامل