TY - GEN
T1 - Resilient intrusion tolerance through proactive and reactive recovery
AU - Sousa, Paulo
AU - Bessani, Alysson Neves
AU - Correia, Miguel
AU - Neves, Nuno Ferreira
AU - Verissimo, Paulo
N1 - Generated from Scopus record by KAUST IRTS on 2021-03-16
PY - 2007/1/1
Y1 - 2007/1/1
N2 - Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as recoveries are faster than an upper-bound on fault production assumed at system deployment time. In this paper, we propose a complementary approach that combines proactive recovery with services that allow correct replicas to react and recover replicas that they detect or suspect to be compromised. One key feature of our proactive-reactive recovery approach is that, despite recoveries, it guarantees the availability of the minimum amount of system replicas necessary to sustain system's correct operation. We design a proactive-reactive recovery service based on a hybrid distributed system model and show, as a case study, how this service can effectively be used to augment the resilience of an intrusion-tolerant firewall adequate for the protection of critical infrastructures. © 2007 IEEE.
AB - Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as recoveries are faster than an upper-bound on fault production assumed at system deployment time. In this paper, we propose a complementary approach that combines proactive recovery with services that allow correct replicas to react and recover replicas that they detect or suspect to be compromised. One key feature of our proactive-reactive recovery approach is that, despite recoveries, it guarantees the availability of the minimum amount of system replicas necessary to sustain system's correct operation. We design a proactive-reactive recovery service based on a hybrid distributed system model and show, as a case study, how this service can effectively be used to augment the resilience of an intrusion-tolerant firewall adequate for the protection of critical infrastructures. © 2007 IEEE.
UR - http://ieeexplore.ieee.org/document/4459669/
UR - http://www.scopus.com/inward/record.url?scp=50049123013&partnerID=8YFLogxK
U2 - 10.1109/PRDC.2007.59
DO - 10.1109/PRDC.2007.59
M3 - Conference contribution
SN - 0769530540
SP - 373
EP - 380
BT - Proceedings - 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007
PB - Abrasive Engineering Society
ER -