A fault-tolerant approach to network security

Jonathan Lundell
{"title":"A fault-tolerant approach to network security","authors":"Jonathan Lundell","doi":"10.1109/NCA.2001.962536","DOIUrl":null,"url":null,"abstract":"Summary form only given. The increasing use of the Internet, especially for internal and business-to-business applications has resulted in the need for increased security for all networked systems to avoid unauthorized access and use. A failure of network security can effectively close the business, its availability is vital to operations. Vital functions such as firewalls and VPNs must remain in operation without loss of time for fallover, without loss of data and must be able to be placed even at remote locations where support personnel may not be readily available. Network firewalls are the first, and often are the only, line of defense against an attack. However, the firewall can be a double-edged sword. In operation, the firewall protects the network from everything from Denial of Service attacks to the entry of known viruses and unauthorized intrusion. If the firewall falls, there are generally only two options: Leave the network open to all or shut down access by anyone. The default condition is to close everything off, but this can be as disastrous as leaving the network open. Due to the importance of the firewall, most leading firewall software provides some method of establishing a form of fail-over redundancy for high availability. Yet in most cases this means some form of clustering using a secondary system as a backup with specialty software to detect and respond to a failure of the primary firewall. Such a clustered approach introduces additional complexity when establishing and configuring the firewall and additional complexity when upgrading. It also adds dramatically to the cost, not only in the hardware for the firewall, but in additional software copies and in the expertise for clustering support software required to establish and maintain the cluster. The approach we will discuss examines the creation of network security based on a hardware approach to fault tolerance. This approach will dramatically reduce the system complexity, simultaneously eliminating the need for special clustering software and special expertise for configuring the system for the kind of continuous availability that is the objective of the network security application. In addition, because the hardware approach is something that is designed in from the inception of the system, there are additional advantages. The fault tolerance is not an afterthought, but rather the purpose of the hardware, meaning that the system can be made to function very smoothly with very little administration. Failure of a part of the system is seamlessly recovered by the redundant elements, without loss of data in memory or loss of state for the system. In sum, this paper discusses the ability to create network security that reaches the standard of being continuously available, what is often referred to as the \"Holy Grail of reliability,\" 99.999% uptime.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"233 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2001.962536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Summary form only given. The increasing use of the Internet, especially for internal and business-to-business applications has resulted in the need for increased security for all networked systems to avoid unauthorized access and use. A failure of network security can effectively close the business, its availability is vital to operations. Vital functions such as firewalls and VPNs must remain in operation without loss of time for fallover, without loss of data and must be able to be placed even at remote locations where support personnel may not be readily available. Network firewalls are the first, and often are the only, line of defense against an attack. However, the firewall can be a double-edged sword. In operation, the firewall protects the network from everything from Denial of Service attacks to the entry of known viruses and unauthorized intrusion. If the firewall falls, there are generally only two options: Leave the network open to all or shut down access by anyone. The default condition is to close everything off, but this can be as disastrous as leaving the network open. Due to the importance of the firewall, most leading firewall software provides some method of establishing a form of fail-over redundancy for high availability. Yet in most cases this means some form of clustering using a secondary system as a backup with specialty software to detect and respond to a failure of the primary firewall. Such a clustered approach introduces additional complexity when establishing and configuring the firewall and additional complexity when upgrading. It also adds dramatically to the cost, not only in the hardware for the firewall, but in additional software copies and in the expertise for clustering support software required to establish and maintain the cluster. The approach we will discuss examines the creation of network security based on a hardware approach to fault tolerance. This approach will dramatically reduce the system complexity, simultaneously eliminating the need for special clustering software and special expertise for configuring the system for the kind of continuous availability that is the objective of the network security application. In addition, because the hardware approach is something that is designed in from the inception of the system, there are additional advantages. The fault tolerance is not an afterthought, but rather the purpose of the hardware, meaning that the system can be made to function very smoothly with very little administration. Failure of a part of the system is seamlessly recovered by the redundant elements, without loss of data in memory or loss of state for the system. In sum, this paper discusses the ability to create network security that reaches the standard of being continuously available, what is often referred to as the "Holy Grail of reliability," 99.999% uptime.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全的容错方法
只提供摘要形式。越来越多地使用Internet,特别是对于内部和企业对企业应用程序,导致需要提高所有网络系统的安全性,以避免未经授权的访问和使用。网络安全出现故障可以有效关闭企业,其可用性对企业运营至关重要。诸如防火墙和vpn之类的重要功能必须保持运行,而不会浪费时间发生故障,也不会丢失数据,并且必须能够放置在支持人员可能不容易获得的远程位置。网络防火墙是抵御攻击的第一道防线,通常也是唯一一道防线。然而,防火墙可能是一把双刃剑。在运行中,防火墙保护网络免受各种攻击,从拒绝服务攻击到已知病毒的进入和未经授权的入侵。如果防火墙崩溃,通常只有两种选择:让网络对所有人开放,或者关闭任何人的访问。默认条件是关闭所有内容,但这可能会像保持网络打开一样造成灾难性后果。由于防火墙的重要性,大多数领先的防火墙软件都提供了一些方法来建立一种故障转移冗余,以实现高可用性。然而,在大多数情况下,这意味着某种形式的集群使用辅助系统作为备份,并使用专用软件来检测和响应主防火墙的故障。这种集群方法在建立和配置防火墙时引入了额外的复杂性,在升级时引入了额外的复杂性。它还极大地增加了成本,不仅增加了防火墙的硬件成本,还增加了额外的软件副本成本,以及建立和维护集群所需的集群支持软件的专业知识成本。我们将讨论的方法检查基于硬件容错方法的网络安全创建。这种方法将显著降低系统复杂性,同时不需要特殊的集群软件和专门知识来配置系统,以实现网络安全应用程序的目标——持续可用性。此外,由于硬件方法是从系统开始设计的,因此还有其他优点。容错性不是事后的想法,而是硬件的目的,这意味着系统可以在很少的管理下非常顺利地运行。系统的一部分故障可以通过冗余元素无缝地恢复,而不会丢失内存中的数据或系统的状态。总之,本文讨论了创建达到持续可用标准的网络安全性的能力,这通常被称为“可靠性的圣杯”,99.999%的正常运行时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Limited scope probing: a distributed approach for QoS-based routing Monitoring of mobile agents in large cluster systems A fault-tolerant approach to network security Calculation of deadline missing probability in a QoS capable cluster interconnect EVA: an event-based framework for developing specialised communication protocols
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1