Centralized Failure Detector via Active Replication

نویسندگان

  • T. Mizrak
  • Stefan Savage
  • Keith Marzullo
چکیده

While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also being actively targeted and compromised. Indeed, due to its central role in end-to-end communication, a compromised router can be leveraged to empower a wide range of direct attacks including eavesdropping, man-in-the-middle subterfuge, and denial of service. In response, a range of specialized anomaly detection protocols has been proposed to detect misbehaving packet forwarding between routers. This article provides a general framework for understanding the design space of this work and reviews the capabilities of various detection protocols. Detecting Compromised Routers via Packet Forwarding Behavior This material is based upon his dissertation research at UCSD. 1 This scheme is also called master-checker, active replication, or state machine approach in the literature. MIZRAK LAYOUT 2/14/08 4:11 PM Page 2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Centralized Detection of Pre-alarm State in Telephone Network of Electric Power Utility

In this paper we consider the mixed telephone network of electric power utility consisting of IP, ISDN and Power Line Carrier links. Very important demand in the network is high availability. The central detector of IP and ISDN link failure (pre-alarm) is presented. The detector function is based on the prolonged response time of the network in the case of IP and ISDN link failure. We define un...

متن کامل

Using Virtualization Technology for Fault-Tolerant Replication in LAN

We present an architecture and an algorithm for Byzantine faulttolerant state machine replication. Our algorithm explores the advantages of virtualization to reliably detect and tolerate faulty replicas, allowing the transformation of Byzantine faults into omission faults. Our approach reduces the total number of physical replicas from 3f+1 to 2f+1. Our approach is based on the concept of twin ...

متن کامل

Semi-passive replication and Lazy Consensus

This paper presents two main contributions: semi-passive replication and Lazy Consensus. The former is a replication technique with parsimonious processing. It is based on the latter; a variant of Consensus allowing the lazy evaluation of proposed values. Semi-passive replication is a replication technique with parsimonious processing. This means that, in the normal case, each request is proces...

متن کامل

A Transaction Replication Scheme for a Replicated Database with Node Autonomy

Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and transaction commit. We consider the ap preach of broadcasting transactions to remote sites and handling these transactions in their complete form at each site. We consider data of two types: shared-private data and publi...

متن کامل

Abstractions for Devising Byzantine-Resilient State Machine Replication

State machine replication is a common approach for making a distributed service highly available and resilient to failures, by replicating it on different processes. It is well-known, however, that the difficulty of ensuring the safety and liveness of a replicated service increases significantly when no synchrony assumptions are made, and when processes can exhibit Byzantine behaviors. The cont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008