Skip to main navigation Skip to search Skip to main content

A novel approach to building intrusion tolerant systems

  • Cleveland State University

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is described. Key components in the proposed system include traffic regulation, application request processing, state protection, integrity checking, and process/node health monitoring. In particular, the separation of execution and state management enables the use of a single process to manage application requests, thereby reducing run-time overhead and enables highly concurrent executions. Furthermore, intrusion attacks are mitigated by two means: (1) append-only state logging so that a compromised execution node cannot corrupt state updates from other nodes; and (2) acceptance testing as a way to verify the integrity of the execution of application requests. When an attack is detected, the malformed requests that materialized the attack are quarantined, and such requests (current and future ones) are rejected. © RAMS Consultants.Printed in India.
Original languageEnglish
Pages (from-to)123-132
Number of pages10
JournalInternational Journal of Performability Engineering
Volume10
Issue number2
StatePublished - Jan 1 2014

Keywords

  • Acceptance test
  • Fault and intrusion tolerance
  • Logging and checkpointing
  • Replication

Cite this