Byzantine Failures and Security: Arbitrary is not (always) Random

نویسنده

  • Felix C. Freiling
چکیده

• " Obvious analogies " [?] – Faults = attacks – Attack detection and response • " When opposites attract " [Lorenzo Alvisi] – Availability vs. confidentiality • Two different communities with different languages • One common thing: the Byzantine failure model – Security people use it to model malicious attackers – Fault-tolerance people know it, apply it, and think about Byzantine-tolerant systems as secure systems • In what sense are fault-tolerance people right? In what sense are Byzantine-tolerant systems secure? • Talk outline: 1. Recap Byzantine failure model 2. Critique 1: the coverage problem 3. Critique 2: the secrecy problem • Warning: no pictures (sorry) • Setting: – An army consisting of n individual divisions is besieging a large town, ready to attack. – Every army has a commander, one of the commanders is the general. – Communication is through messengers which travel on foot between the armies (every commander can directly talk with every other commander). – A certain fraction (maximal t out of n) commanders can be traitors (including the general). • Task: Attack town, but all non-traitors must attack at the same time for the attack to succeed. – General sends out time to attack. – All commanders must attack at the same time. – If the general is not a traitor, then they all will attack at the time he commands. • Traitors can act in arbitrary ways. • Root of the problem: if the general is a traitor, he could send conflicting time values to commanders 6/21 Application • Replicated processors must act in unison despite the fact that they get different inputs. – Commanders are replicated processes which must decide which step to take next • Equivalent problem: Byzantine Agreement (BA) – Every process proposes a value – All non-faulty processes decide on the same value – The decided value was proposed by some process • Results: – BA is impossible if t ≥ n/3 [Pease et al. 1980] – There exists an algorithm which solves BA for t < n/3 [Lamport et al. 1982] * t rounds of message exchange and relay: " q said that p said that. . .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Case for Byzantine Fault Detection

Distributed systems are subject to a variety of failures and attacks. In this paper, we consider general (Byzantine) failures [11], in which a failed node may exhibit arbitrary behavior. In particular, a failed node may corrupt its local state, send random messages, or even send specific messages aimed at subverting the system. Many security attacks can be modeled as Byzantine failures, such as...

متن کامل

A Proposal to investigate the use of error correcting code techniques in implementing distributed systems resistant to Byzantine failures and security breaches

Throughout the literature on reliable distributed systems there is much coverage of systems which maintain correct operations in the face of fail-stop or non-Byzantine failures. What are less represented are methods for dealing with the harder problem of Byzantine failures. This paper proposes a method for dealing with these sort of failures. Fail-stop or non-Byzantine failures typically are ch...

متن کامل

A Scalable Byzantine Grid

Modern networks assemble an ever growing number of nodes. However, it remains difficult to increase the number of channels per node, thus the maximal degree of the network may be bounded. This is typically the case in grid topology networks, where each node has at most four neighbors. In this paper, we address the following issue: if each node is likely to fail in an unpredictable manner, how c...

متن کامل

Atomic Broadcast: From Simple Message Di usion to Byzantine Agreement

In distributed systems subject to random communication delays and component failures, atomic broadcast can be used to implement the abstraction of synchronous replicated storage, a distributed storage that displays the same contents at every correct processor as of any clock time. This paper presents a systematic derivation of a family of atomic broadcast protocols that are tolerant of increasi...

متن کامل

Consensus in byzantine asynchronous systems

This paper presents a consensus protocol resilient to Byzantine failures. It uses signed and certified messages and is based on two underlying failure detection modules. The first is an unreliable failure detector module of the class 3S(bz). The second is a reliable arbitrary behavior detection module. More precisely, the first module detects processes that stop sending messages, while processe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003