Feedback Verification for Trustworthy Tomography
نویسندگان
چکیده
Network tomography is a process by which internal characteristics of a network are inferred from “external” end-to-end measurements. To ensure that the inferred internal characteristics are sound and trustworthy, it is essential to verify the integrity of data collected from external measurements. In this paper, we present an algorithm which can verify the integrity of data collected from end-to-end multicast measurements. This data is used by a multicastbased tomography tool called MINC to infer loss rates on internal network links. MINC performs loss inference by analyzing binary feedbacks reported by receivers in response to multicast probes sent from the source. However, buggy or malicious receivers can report incorrect feedbacks, resulting in a faulty loss inference. In this work, we consider the problem of verifying the integrity of binary feedbacks collected from receivers of a multicast tree to ensure a sound and trustworthy MINC loss inference. We start by showing how the MINC loss inference becomes erroneous if feedbacks of receivers are altered. Then, we present a statistical verification algorithm which checks if feedbacks of receivers are consistent with respect to one another. We present the performance of this algorithm on Model-based traces, NS traces and MBone loss traces.
منابع مشابه
Component-based hardware/software co-verification for building trustworthy embedded systems
We present a novel component-based approach to hardware/software co-verification of embedded systems using model checking. Embedded systems are pervasive and often mission-critical, therefore, they must be highly trustworthy. Trustworthy embedded systems require extensive verification. The close interactions between hardware and software of embedded systems demand co-verification. Due to their ...
متن کاملComponent - Based Hardware / Software Co - Verification for Building Trustworthy
We present a novel component-based approach to hardware/software co-verification of embedded systems using model checking. Embedded systems are pervasive and often mission-critical, therefore, they must be highly trustworthy. Trustworthy embedded systems require extensive verification. The close interactions between hardware and software of embedded systems demand co-verification. Due to their ...
متن کاملA Model for New Zealand's Identity Verification Service
We develop a simple model of the processes by which identity and anonymity are managed by complex systems. We explain New Zealand’s recently-proposed Identity Verification Service in terms of our model. We also indicate how our model might be used to guide the architecture of a next generation of trustworthy computing, and how it might be used to define a precise taxonomy of authentication.
متن کاملProvably trustworthy systems.
We present recent work on building and scaling trustworthy systems with formal, machine-checkable proof from the ground up, including the operating system kernel, at the level of binary machine code. We first give a brief overview of the seL4 microkernel verification and how it can be used to build verified systems. We then show two complementary techniques for scaling these methods to larger s...
متن کاملComparative Study between Electronic Portal Imaging Device (EPID) and Cone Beam Computed Tomography (CBCT) for Radiation Treatment Verifications
Introduction: Electronic Portal Imaging Device (EPID) and Cone Beam Computed Tomography (CBCT) are the preferred tools of Image Guided Radiotherapy (IGRT) and Dose Guided Radiotherapy (DGRT) which have been used for Radiotherapy treatment verifications. As a result, the number of publications dealing with these two tools for radiation treatment verification has increased consi...
متن کامل