Cheap Intrusion-Tolerant Protection for CRUTIAL Things
Autor(a) principal: | |
---|---|
Data de Publicação: | 2009 |
Outros Autores: | , , , |
Tipo de documento: | Relatório |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10451/14227 |
Resumo: | Reviewed by Marcelo Pasin |
id |
RCAP_8bf95361a6d159f0d64eab7af7c65602 |
---|---|
oai_identifier_str |
oai:repositorio.ul.pt:10451/14227 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Cheap Intrusion-Tolerant Protection for CRUTIAL ThingsFirewallsSecurityCritical InfrastructuresByzantine Fault ToleranceIntrusion ToleranceReviewed by Marcelo PasinToday’s critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other interconnected computer system, but their failure has a high socio-economic impact. The report describes a new construct for the protection of these infrastructures, based on distributed algorithms and mechanisms implemented between a set of devices called CIS. CIS collectively ensure that incoming/outgoing traffic satisfies the security policy of an organization facing accidents and attacks. However, they are not simple firewalls but distributed protection devices based on a sophisticated access control model and designed with intrusion-tolerant capabilities. The report discusses the rationale behind the use of CIS to improve the resilience of critical infrastructures, and it describes and evaluates two CIS implementations, one using physical replicas, and another using virtual machine (VM) based replicas. Our intrusion-tolerant solution is cheap in four different ways: it uses less replicas than other intrusion-tolerant services; it does not requires expensive consensus protocols; the performance overhead is minimal; and it can be deployed in a single physical machine through the use of VM technology.Repositório da Universidade de LisboaCorreia, MiguelBessani, AlyssonNeves, NunoVerissimo, PauloSousa, Paulo2009-09-10T15:54:08Z2009-09-10T15:54:08Z2009-09-10info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14227enginfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-11-08T15:59:54Zoai:repositorio.ul.pt:10451/14227Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T21:36:03.181832Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
spellingShingle |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things Correia, Miguel Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
title_short |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_full |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_fullStr |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_full_unstemmed |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_sort |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
author |
Correia, Miguel |
author_facet |
Correia, Miguel Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
author_role |
author |
author2 |
Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
author2_role |
author author author author |
dc.contributor.none.fl_str_mv |
Repositório da Universidade de Lisboa |
dc.contributor.author.fl_str_mv |
Correia, Miguel Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
dc.subject.por.fl_str_mv |
Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
topic |
Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
description |
Reviewed by Marcelo Pasin |
publishDate |
2009 |
dc.date.none.fl_str_mv |
2009-09-10T15:54:08Z 2009-09-10T15:54:08Z 2009-09-10 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/report |
format |
report |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10451/14227 |
url |
http://hdl.handle.net/10451/14227 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799134259349291008 |