Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense

被引:3
作者
Jang, Bumsoon [1 ]
Doo, Seokjoo [2 ]
Lee, Soojin [3 ]
Yoon, Hyunsoo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, 219 Daehak Ro, Taejon 305701, South Korea
[2] Korea Army Acad Yeong Cheon, Dept Elect Engn, 495 Hoguk Ro, Yeongcheon Si 770849, Gyeongbuk, South Korea
[3] Korea Natl Def Univ, Dept Def Informat Sci, 33 Je2Jayu Ro, Goyang Si 412706, Gyeonggi Do, South Korea
关键词
intrusion tolerant system (ITS); hybrid recovery; availability-driven recovery; dynamic cluster resizing; mission-critical application;
D O I
10.1587/transinf.2015CYP0006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the periodic recovery of virtual machines regardless of whether malicious intrusions exist, proactive recovery-based Intrusion Tolerant Systems (ITSs) are being considered for mission-critical applications. However, the virtual replicas can easily be exposed to attacks during their working period, and additionally, proactive recovery based ITSs are ineffective in eliminating the vulnerability of exposure time, which is closely related to service availability. To address these problems, we propose a novel hybrid recovery-based ITS in this paper. The proposed method utilizes availability-driven recovery and dynamic cluster resizing. The availability-driven recovery method operates the recovery process by both proactive and reactive ways for the system to gain shorter exposure times and higher success rates. The dynamic cluster resizing method reduces the overhead of the system that occurs from dynamic workload fluctuations. The performance of the proposed ITS with various synthetic and real workloads using CloudSim showed that it guarantees higher availability and reliability of the system, even under malicious intrusions such as DDoS attacks.
引用
收藏
页码:1081 / 1091
页数:11
相关论文
共 35 条
[1]  
Alhamad M, 2010, P 12 INT C INF INT W, P603, DOI DOI 10.1145/1967486.1967579
[2]  
Ali-Eldin A, 2012, IEEE IFIP NETW OPER, P204, DOI 10.1109/NOMS.2012.6211900
[3]  
[Anonymous], LECT NOTES ELECT ENG
[4]  
Arsenault D, 2007, ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, P343
[5]   Adaptive cyberdefense for survival and intrusion tolerance [J].
Atighetchi, M ;
Pal, P ;
Webber, F ;
Schantz, R ;
Jones, C ;
Loyall, J .
IEEE INTERNET COMPUTING, 2004, 8 (06) :25-33
[6]   Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) [J].
Bangalore, Anantha K. ;
Sood, Arun K. .
DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, :60-65
[7]  
Bessani A. N., 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), P15, DOI 10.1109/DSNW.2011.5958857
[8]   Secure intrusion-tolerant replication on the Internet [J].
Cachin, C ;
Poritz, JA .
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, :167-176
[9]   CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms [J].
Calheiros, Rodrigo N. ;
Ranjan, Rajiv ;
Beloglazov, Anton ;
De Rose, Cesar A. F. ;
Buyya, Rajkumar .
SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01) :23-50
[10]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461