Cheap Intrusion-Tolerant Protection for CRUTIAL Things

Detalhes bibliográficos
Autor(a) principal: Correia, Miguel
Data de Publicação: 2009
Outros Autores: Bessani, Alysson, Neves, Nuno, Verissimo, Paulo, Sousa, Paulo
Tipo de documento: Relatório
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10451/14227
Resumo: Reviewed by Marcelo Pasin
id RCAP_8bf95361a6d159f0d64eab7af7c65602
oai_identifier_str oai:repositorio.ul.pt:10451/14227
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Cheap Intrusion-Tolerant Protection for CRUTIAL ThingsFirewallsSecurityCritical InfrastructuresByzantine Fault ToleranceIntrusion ToleranceReviewed by Marcelo PasinToday’s critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other interconnected computer system, but their failure has a high socio-economic impact. The report describes a new construct for the protection of these infrastructures, based on distributed algorithms and mechanisms implemented between a set of devices called CIS. CIS collectively ensure that incoming/outgoing traffic satisfies the security policy of an organization facing accidents and attacks. However, they are not simple firewalls but distributed protection devices based on a sophisticated access control model and designed with intrusion-tolerant capabilities. The report discusses the rationale behind the use of CIS to improve the resilience of critical infrastructures, and it describes and evaluates two CIS implementations, one using physical replicas, and another using virtual machine (VM) based replicas. Our intrusion-tolerant solution is cheap in four different ways: it uses less replicas than other intrusion-tolerant services; it does not requires expensive consensus protocols; the performance overhead is minimal; and it can be deployed in a single physical machine through the use of VM technology.Repositório da Universidade de LisboaCorreia, MiguelBessani, AlyssonNeves, NunoVerissimo, PauloSousa, Paulo2009-09-10T15:54:08Z2009-09-10T15:54:08Z2009-09-10info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14227enginfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-11-08T15:59:54Zoai:repositorio.ul.pt:10451/14227Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T21:36:03.181832Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title Cheap Intrusion-Tolerant Protection for CRUTIAL Things
spellingShingle Cheap Intrusion-Tolerant Protection for CRUTIAL Things
Correia, Miguel
Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
title_short Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_full Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_fullStr Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_full_unstemmed Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_sort Cheap Intrusion-Tolerant Protection for CRUTIAL Things
author Correia, Miguel
author_facet Correia, Miguel
Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
author_role author
author2 Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
author2_role author
author
author
author
dc.contributor.none.fl_str_mv Repositório da Universidade de Lisboa
dc.contributor.author.fl_str_mv Correia, Miguel
Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
dc.subject.por.fl_str_mv Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
topic Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
description Reviewed by Marcelo Pasin
publishDate 2009
dc.date.none.fl_str_mv 2009-09-10T15:54:08Z
2009-09-10T15:54:08Z
2009-09-10
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/report
format report
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10451/14227
url http://hdl.handle.net/10451/14227
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799134259349291008