Centralized Failure Detector via Active Replication
نویسندگان
چکیده
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct attacks including eavesdropping, man-in-the-middle subterfuge, and denial of service. In response, a range of specialized anomaly detection protocols has been proposed to detect misbehaving packet forwarding between routers. This article provides a general framework for understanding the design space of this work and reviews the capabilities of various detection protocols. Detecting Compromised Routers via Packet Forwarding Behavior This material is based upon his dissertation research at UCSD. 1 This scheme is also called master-checker, active replication, or state machine approach in the literature. MIZRAK LAYOUT 2/14/08 4:11 PM Page 2
منابع مشابه
Centralized Detection of Pre-alarm State in Telephone Network of Electric Power Utility
In this paper we consider the mixed telephone network of electric power utility consisting of IP, ISDN and Power Line Carrier links. Very important demand in the network is high availability. The central detector of IP and ISDN link failure (pre-alarm) is presented. The detector function is based on the prolonged response time of the network in the case of IP and ISDN link failure. We define un...
متن کاملUsing Virtualization Technology for Fault-Tolerant Replication in LAN
We present an architecture and an algorithm for Byzantine faulttolerant state machine replication. Our algorithm explores the advantages of virtualization to reliably detect and tolerate faulty replicas, allowing the transformation of Byzantine faults into omission faults. Our approach reduces the total number of physical replicas from 3f+1 to 2f+1. Our approach is based on the concept of twin ...
متن کاملSemi-passive replication and Lazy Consensus
This paper presents two main contributions: semi-passive replication and Lazy Consensus. The former is a replication technique with parsimonious processing. It is based on the latter; a variant of Consensus allowing the lazy evaluation of proposed values. Semi-passive replication is a replication technique with parsimonious processing. This means that, in the normal case, each request is proces...
متن کاملA Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and transaction commit. We consider the ap preach of broadcasting transactions to remote sites and handling these transactions in their complete form at each site. We consider data of two types: shared-private data and publi...
متن کاملAbstractions for Devising Byzantine-Resilient State Machine Replication
State machine replication is a common approach for making a distributed service highly available and resilient to failures, by replicating it on different processes. It is well-known, however, that the difficulty of ensuring the safety and liveness of a replicated service increases significantly when no synchrony assumptions are made, and when processes can exhibit Byzantine behaviors. The cont...
متن کامل