How Practical Are Intrusion-Tolerant Distributed Systems?
Autor(a) principal: | |
---|---|
Data de Publicação: | 2006 |
Outros Autores: | , , |
Tipo de documento: | Relatório |
Idioma: | por |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10451/14093 |
Resumo: | Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically rely on the assumption that the system components fail or are compromised independently. This is a strong assumption that has been repeatedly questioned. In this paper we discuss how this assumption can be implemented in practice using diversity of system components. We present a taxonomy of axes of diversity and discuss how they provide failure independence. Furthermore, we provide a practical example of an intrusion-tolerant system built using diversity. |
id |
RCAP_4c7d6dadc3fc112c476fb37511001578 |
---|---|
oai_identifier_str |
oai:repositorio.ul.pt:10451/14093 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
How Practical Are Intrusion-Tolerant Distributed Systems?intrusion tolerancediversitysecurityfault toleranceBuilding secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically rely on the assumption that the system components fail or are compromised independently. This is a strong assumption that has been repeatedly questioned. In this paper we discuss how this assumption can be implemented in practice using diversity of system components. We present a taxonomy of axes of diversity and discuss how they provide failure independence. Furthermore, we provide a practical example of an intrusion-tolerant system built using diversity.Department of Informatics, University of LisbonRepositório da Universidade de LisboaObelheiro, Rafael R.Bessani, Alysson NevesLung, Lau CheukCorreia, Miguel2009-02-10T13:11:55Z2006-092006-09-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14093porinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-11-08T15:59:40Zoai:repositorio.ul.pt:10451/14093Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T21:35:57.146784Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
How Practical Are Intrusion-Tolerant Distributed Systems? |
title |
How Practical Are Intrusion-Tolerant Distributed Systems? |
spellingShingle |
How Practical Are Intrusion-Tolerant Distributed Systems? Obelheiro, Rafael R. intrusion tolerance diversity security fault tolerance |
title_short |
How Practical Are Intrusion-Tolerant Distributed Systems? |
title_full |
How Practical Are Intrusion-Tolerant Distributed Systems? |
title_fullStr |
How Practical Are Intrusion-Tolerant Distributed Systems? |
title_full_unstemmed |
How Practical Are Intrusion-Tolerant Distributed Systems? |
title_sort |
How Practical Are Intrusion-Tolerant Distributed Systems? |
author |
Obelheiro, Rafael R. |
author_facet |
Obelheiro, Rafael R. Bessani, Alysson Neves Lung, Lau Cheuk Correia, Miguel |
author_role |
author |
author2 |
Bessani, Alysson Neves Lung, Lau Cheuk Correia, Miguel |
author2_role |
author author author |
dc.contributor.none.fl_str_mv |
Repositório da Universidade de Lisboa |
dc.contributor.author.fl_str_mv |
Obelheiro, Rafael R. Bessani, Alysson Neves Lung, Lau Cheuk Correia, Miguel |
dc.subject.por.fl_str_mv |
intrusion tolerance diversity security fault tolerance |
topic |
intrusion tolerance diversity security fault tolerance |
description |
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically rely on the assumption that the system components fail or are compromised independently. This is a strong assumption that has been repeatedly questioned. In this paper we discuss how this assumption can be implemented in practice using diversity of system components. We present a taxonomy of axes of diversity and discuss how they provide failure independence. Furthermore, we provide a practical example of an intrusion-tolerant system built using diversity. |
publishDate |
2006 |
dc.date.none.fl_str_mv |
2006-09 2006-09-01T00:00:00Z 2009-02-10T13:11:55Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/report |
format |
report |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10451/14093 |
url |
http://hdl.handle.net/10451/14093 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Department of Informatics, University of Lisbon |
publisher.none.fl_str_mv |
Department of Informatics, University of Lisbon |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799134258150768640 |