Sustaining Intrusion-Tolerance by Proactive Replacement

نویسندگان

  • P. Ezhilchelvan
  • D. Clarke
  • I. Mitrani
  • S. Shrivastava
چکیده

We propose and study proactive replacement as a strategy for ensuring that the number of intrusions does not exceed the design threshold within an intrusiontolerant system. State machine replicas periodically replace themselves, en masse, by selecting a successor set from a large server farm housing spare machines that have been cleaned-up subsequent to any prior use. Selection is random to thwart adversary’s preference for any particular type of successor machines. Optionally, successors’ identities can be kept anonymous from selecting replicas, forcing the adversary to discover first the new replicas’ identities before launching attacks. Practicability of the proposed strategy is established in two ways. Architecture and combinations of well-known protocols for selection and state-transfer are outlined for the three replacement schemes proposed. Using analytical estimations and simulations, the replacement schemes are shown to be effective in sustaining tolerance capability by comparing them with a proactive recovery scheme that is assisted by an idealized Wormhole. With the availability and affordability of redundant machines, proactive replacement is a useful tolerance-sustaining strategy either on its own or in combination with its orthogonal counter-part, proactive recovery. © 2009 University of Newcastle upon Tyne. Printed and published by the University of Newcastle upon Tyne, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details EZHILCHELVAN, P., CLARKE, D., MITRANI, I., SHRIVASTAVA. Sustaining Intrusion-Tolerance by Proactive Replacement [By] P. Ezhilchelvan, D. Clarke, I. Mitrani, S. Shrivastava. Newcastle upon Tyne: University of Newcastle upon Tyne: Computing Science, 2009. (University of Newcastle upon Tyne, Computing Science, Technical Report Series, No. CS-TR-1146)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults

Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on the means of proactive security. The development of a fault-tolerant system requires the explication of its underlying fault assumptions. In this context, we propose a viewpoint on faults that discriminates whether the...

متن کامل

Diverse OS Rejuvenation for Intrusion Tolerance

Proactive recovery is technique that periodically rejuvenates the components of a replicated system. When used in the context of intrusion-tolerant systems, in which faulty replicas may be under control of some adversary, it allows the removal of intrusions from the compromised replicas. However, since the set of vulnerabilities remains the same, the adversary can take advantage of the previous...

متن کامل

RoViM: Rotating Virtual Machines for Security and Fault-Tolerance

Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...

متن کامل

Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In o...

متن کامل

VM-FIT: Supporting Intrusion Tolerance with Virtualisation Technology

The use of virtualisation technology on modern standard PC hardware has become popular in the recent years. This paper presents the VM-FIT architecture, which uses virtualisation for realising fault and intrusion tolerant networkbased services. The VM-FIT infrastructure intercepts the client–service interaction at the hypervisor level, below the guest operating system that hosts a service imple...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009