首页 > 最新文献

2015 11th European Dependable Computing Conference (EDCC)最新文献

英文 中文
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds IaaS云环境下网络入侵检测系统的自动化评估
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.10
T. Probst, E. Alata, M. Kaâniche, V. Nicomette
This paper describes an approach for the automated security evaluation of operational Network Intrusion Detection Systems (NIDS) in Infrastructure as a Service (IaaS) cloud computing environments. Our objective is to provide automated and experimental methods to execute attack campaigns and analyze NIDS reactions, in order to highlight the ability of the NIDS to protect clients' virtual infrastructures and find potential weaknesses in their placement and configuration. To do so, we designed a three-phase approach. It is composed of the cloning of the target client's infrastructure to perform the subsequent audit operations on a clone, followed by the analysis of network access controls to determine the network accessibilities in the cloned infrastructure. Using evaluation traffic we modeled and generated, the last phase of the approach, presented in this paper, focuses on executing attack campaigns following an optimized algorithm. The NIDS alerts are analyzed and evaluation metrics are computed. Our approach is sustained by a prototype and experiments carried out on a VMware-based cloud platform.
本文描述了一种在基础设施即服务(IaaS)云计算环境中对可操作的网络入侵检测系统(NIDS)进行自动安全评估的方法。我们的目标是提供自动化的实验方法来执行攻击活动和分析NIDS的反应,以突出NIDS保护客户端虚拟基础设施的能力,并发现其放置和配置中的潜在弱点。为此,我们设计了一个三阶段的方法。它包括克隆目标客户端的基础设施,以便对克隆的基础设施执行后续审计操作,然后分析网络访问控制,以确定克隆基础设施中的网络可访问性。使用我们建模和生成的评估流量,本文提出的方法的最后阶段侧重于按照优化算法执行攻击活动。分析NIDS警报并计算评估指标。我们的方法得到了基于vmware的云平台上的原型和实验的支持。
{"title":"Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds","authors":"T. Probst, E. Alata, M. Kaâniche, V. Nicomette","doi":"10.1109/EDCC.2015.10","DOIUrl":"https://doi.org/10.1109/EDCC.2015.10","url":null,"abstract":"This paper describes an approach for the automated security evaluation of operational Network Intrusion Detection Systems (NIDS) in Infrastructure as a Service (IaaS) cloud computing environments. Our objective is to provide automated and experimental methods to execute attack campaigns and analyze NIDS reactions, in order to highlight the ability of the NIDS to protect clients' virtual infrastructures and find potential weaknesses in their placement and configuration. To do so, we designed a three-phase approach. It is composed of the cloning of the target client's infrastructure to perform the subsequent audit operations on a clone, followed by the analysis of network access controls to determine the network accessibilities in the cloned infrastructure. Using evaluation traffic we modeled and generated, the last phase of the approach, presented in this paper, focuses on executing attack campaigns following an optimized algorithm. The NIDS alerts are analyzed and evaluation metrics are computed. Our approach is sustained by a prototype and experiments carried out on a VMware-based cloud platform.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems 内存受限嵌入式系统的灵活入侵检测系统
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.17
F. Tabrizi, K. Pattabiraman
Embedded systems are widely used in critical situations and hence, are targets for malicious users. Researchers have demonstrated successful attacks against embedded systems used in power grids, modern cars, and medical devices. This makes building Intrusion Detection Systems (IDS)for embedded devices a necessity. However, embedded devices have constraints(such as limited memory capacity) that make building IDSes monitoring all their security properties challenging. In this paper, we formulate building IDS for embedded systems as an optimization problem. Having the set of the security properties of the system and the invariants that verify those properties, we build an IDS that maximizes the coverage for the security properties, with respect to the available memory. This allows our IDS to be applicable to a wide range of embedded devices with different memory capacities. In our formulation users may define their own coverage criteria for the security properties. We also propose two coverage criteria and build IDSes based on them. We implement our IDSes for SegMeter, an open source smart meter. Our results show that our IDSes provide a high detection rate in spite of memory constraints of the system. Further, the detection rate of our IDSes at runtime are close to their estimated coverage at design time. This validates our approach in quantifying the coverage of our IDSes and optimizing them.
嵌入式系统广泛应用于关键场合,因此成为恶意用户的攻击目标。研究人员已经展示了针对电网、现代汽车和医疗设备中使用的嵌入式系统的成功攻击。这使得为嵌入式设备构建入侵检测系统(IDS)成为必要。然而,嵌入式设备有一些限制(例如有限的内存容量),这使得构建监视其所有安全属性的ids具有挑战性。在本文中,我们将嵌入式系统的建筑IDS作为一个优化问题来表述。有了系统的安全属性集和验证这些属性的不变量,我们就可以构建一个IDS,它可以根据可用内存最大化安全属性的覆盖范围。这使得我们的IDS适用于各种具有不同内存容量的嵌入式设备。在我们的配方中,用户可以为安全属性定义他们自己的覆盖标准。我们还提出了两个覆盖标准,并在此基础上构建ids。我们实现了SegMeter的ids,这是一个开源的智能电表。结果表明,尽管系统存在内存限制,ids仍能提供较高的检测率。此外,我们的ids在运行时的检测率接近于它们在设计时的估计覆盖率。这验证了我们量化ids覆盖范围并对其进行优化的方法。
{"title":"Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems","authors":"F. Tabrizi, K. Pattabiraman","doi":"10.1109/EDCC.2015.17","DOIUrl":"https://doi.org/10.1109/EDCC.2015.17","url":null,"abstract":"Embedded systems are widely used in critical situations and hence, are targets for malicious users. Researchers have demonstrated successful attacks against embedded systems used in power grids, modern cars, and medical devices. This makes building Intrusion Detection Systems (IDS)for embedded devices a necessity. However, embedded devices have constraints(such as limited memory capacity) that make building IDSes monitoring all their security properties challenging. In this paper, we formulate building IDS for embedded systems as an optimization problem. Having the set of the security properties of the system and the invariants that verify those properties, we build an IDS that maximizes the coverage for the security properties, with respect to the available memory. This allows our IDS to be applicable to a wide range of embedded devices with different memory capacities. In our formulation users may define their own coverage criteria for the security properties. We also propose two coverage criteria and build IDSes based on them. We implement our IDSes for SegMeter, an open source smart meter. Our results show that our IDSes provide a high detection rate in spite of memory constraints of the system. Further, the detection rate of our IDSes at runtime are close to their estimated coverage at design time. This validates our approach in quantifying the coverage of our IDSes and optimizing them.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125330502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Dynamic VM Dependability Monitoring Using Hypervisor Probes 使用Hypervisor探针的动态VM可靠性监控
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.9
Z. Estrada, C. Pham, Fei Deng, Lok K. Yan, Z. Kalbarczyk, R. Iyer
Many current VM monitoring approaches require guest OS modifications and are also unable to perform application level monitoring, reducing their value in a cloud setting. This paper introduces hprobes, a framework that allows one to dynamically monitor applications and operating systems inside a VM. The hprobe framework does not require any changes to the guest OS, which avoids the tight coupling of monitoring with its target. Furthermore, the monitors can be customized and enabled/disabled while the VM is running. To demonstrate the usefulness of this framework, we present three sample detectors: an emergency detector for a security vulnerability, an application watchdog, and an infinite-loop detector. We test our detectors on real applications and demonstrate that those detectors achieve an acceptable level of performance overhead with a high degree of flexibility.
许多当前的VM监控方法需要修改客户操作系统,并且无法执行应用程序级别的监控,从而降低了它们在云环境中的价值。本文介绍了hprobes,这是一个允许动态监视VM中的应用程序和操作系统的框架。hprobe框架不需要对客户机操作系统进行任何更改,从而避免了监视与其目标系统的紧密耦合。此外,可以自定义监视器,并在VM运行时启用/禁用监视器。为了演示该框架的有用性,我们提供了三个示例检测器:用于安全漏洞的紧急检测器、应用程序看门狗和无限循环检测器。我们在实际应用程序中测试我们的检测器,并证明这些检测器具有高度的灵活性,达到了可接受的性能开销水平。
{"title":"Dynamic VM Dependability Monitoring Using Hypervisor Probes","authors":"Z. Estrada, C. Pham, Fei Deng, Lok K. Yan, Z. Kalbarczyk, R. Iyer","doi":"10.1109/EDCC.2015.9","DOIUrl":"https://doi.org/10.1109/EDCC.2015.9","url":null,"abstract":"Many current VM monitoring approaches require guest OS modifications and are also unable to perform application level monitoring, reducing their value in a cloud setting. This paper introduces hprobes, a framework that allows one to dynamically monitor applications and operating systems inside a VM. The hprobe framework does not require any changes to the guest OS, which avoids the tight coupling of monitoring with its target. Furthermore, the monitors can be customized and enabled/disabled while the VM is running. To demonstrate the usefulness of this framework, we present three sample detectors: an emergency detector for a security vulnerability, an application watchdog, and an infinite-loop detector. We test our detectors on real applications and demonstrate that those detectors achieve an acceptable level of performance overhead with a high degree of flexibility.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121240709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LATED: Lifetime-Aware Tag for Enduring Design 相关:持久设计的寿命感知标签
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.31
Seyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah, Hamed Farbeh, S. Miremadi
Nowadays, leakage energy constitutes up to80% of total cache energy consumption and tag array isresponsible for a considerable fraction of static energyconsumption. An approach to reduce static energyconsumption is to replace SRAMs by STT-RAMs with nearzero leakage power. However, a problem of an STT-RAMcell is its limited write endurance. In spite of previousstudies which have targeted the data array, in this studySTT-RAMs are used in the L1 tag array. To solve the writeendurance problem, this paper proposes an STTRAM/SRAM tag architecture. Considering the spatiallocality of memory references, the lower significant bitlinesof the tag update more. The SRAM part handles theupdates in the bit-lines which their lifetime is less than thedesired lifetime. The proposed architecture is evaluated bythe gem5 simulator running Mibench benchmark suits. The evaluation results recommend implementing less than30% of bit-lines of the STT-RAM-based tag array bySRAMs for a 5-year lifetime. Moreover, the static energyconsumption is reduced up to 82 % in comparison withSRAM tag array.
如今,泄漏能量占总缓存能耗的80%,标签阵列占静态能耗的相当大一部分。以泄漏功率接近于零的stt - ram取代sram是降低静态能耗的一种方法。然而,STT-RAMcell的一个问题是它的写入持久性有限。尽管以前的研究已经针对数据阵列,但在本研究中,在L1标签阵列中使用了ystt - ram。为了解决写持久性问题,本文提出了一种stram /SRAM标签架构。考虑到内存引用的空间局部性,标签的低有效位线更新更多。SRAM部分处理位行中的更新,这些更新的生存期小于期望的生存期。通过运行Mibench基准套件的gem5模拟器对所提出的体系结构进行了评估。评估结果建议在5年的寿命期内,使用ysram实现小于30%的基于stt - ram的标签阵列的位行。此外,与sram标签阵列相比,静态能耗降低了82%。
{"title":"LATED: Lifetime-Aware Tag for Enduring Design","authors":"Seyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah, Hamed Farbeh, S. Miremadi","doi":"10.1109/EDCC.2015.31","DOIUrl":"https://doi.org/10.1109/EDCC.2015.31","url":null,"abstract":"Nowadays, leakage energy constitutes up to80% of total cache energy consumption and tag array isresponsible for a considerable fraction of static energyconsumption. An approach to reduce static energyconsumption is to replace SRAMs by STT-RAMs with nearzero leakage power. However, a problem of an STT-RAMcell is its limited write endurance. In spite of previousstudies which have targeted the data array, in this studySTT-RAMs are used in the L1 tag array. To solve the writeendurance problem, this paper proposes an STTRAM/SRAM tag architecture. Considering the spatiallocality of memory references, the lower significant bitlinesof the tag update more. The SRAM part handles theupdates in the bit-lines which their lifetime is less than thedesired lifetime. The proposed architecture is evaluated bythe gem5 simulator running Mibench benchmark suits. The evaluation results recommend implementing less than30% of bit-lines of the STT-RAM-based tag array bySRAMs for a 5-year lifetime. Moreover, the static energyconsumption is reduced up to 82 % in comparison withSRAM tag array.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128646222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Stream Clustering for Online Anomaly Detection in Cloud Applications 云应用中在线异常检测的数据流聚类
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.22
Carla Sauvanaud, Guthemberg Silvestre, M. Kaâniche, K. Kanoun
This paper introduces a new approach for the online detection of performance anomalies in cloud virtual machines (VMs). It is designed for cloud infrastructure providers to detect during runtime unknown anomalies that may still be observed in complex modern systems hosted on VMs. The approach is drawn on data stream clustering of per-VM monitoring data and detects at a fine granularity where anomalies occur. Its operations are independent of the types of applications deployed over VMs. Moreover it deals with frequent changes in systems normal behaviors during runtime. The parallel analyses of each VM makes this approach scalable to a large number of VMs composing an application. The approach consists of two online steps: 1) the incremental update of sets of clusters by means of data stream clustering, and 2) the computation of two attributes characterizing the global clusters evolution. We validate our approach over a VMware vSphere testbed. It hosts a typical cloud application, MongoDB, that we study in normal behavior contexts and in presence of anomalies.
本文介绍了一种在线检测云虚拟机性能异常的新方法。它是为云基础设施提供商设计的,用于在运行时检测在虚拟机上托管的复杂现代系统中可能仍然观察到的未知异常。该方法基于每个vm监控数据的数据流集群,并在异常发生的细粒度上进行检测。其操作与虚拟机上部署的应用类型无关。此外,它还处理运行时系统正常行为的频繁变化。对每个VM的并行分析使得这种方法可扩展到组成应用程序的大量VM。该方法包括两个在线步骤:1)通过数据流聚类对聚类集进行增量更新;2)计算表征聚类全局演化的两个属性。我们在VMware vSphere测试平台上验证了我们的方法。它托管了一个典型的云应用程序MongoDB,我们在正常行为环境和异常情况下研究它。
{"title":"Data Stream Clustering for Online Anomaly Detection in Cloud Applications","authors":"Carla Sauvanaud, Guthemberg Silvestre, M. Kaâniche, K. Kanoun","doi":"10.1109/EDCC.2015.22","DOIUrl":"https://doi.org/10.1109/EDCC.2015.22","url":null,"abstract":"This paper introduces a new approach for the online detection of performance anomalies in cloud virtual machines (VMs). It is designed for cloud infrastructure providers to detect during runtime unknown anomalies that may still be observed in complex modern systems hosted on VMs. The approach is drawn on data stream clustering of per-VM monitoring data and detects at a fine granularity where anomalies occur. Its operations are independent of the types of applications deployed over VMs. Moreover it deals with frequent changes in systems normal behaviors during runtime. The parallel analyses of each VM makes this approach scalable to a large number of VMs composing an application. The approach consists of two online steps: 1) the incremental update of sets of clusters by means of data stream clustering, and 2) the computation of two attributes characterizing the global clusters evolution. We validate our approach over a VMware vSphere testbed. It hosts a typical cloud application, MongoDB, that we study in normal behavior contexts and in presence of anomalies.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"1987 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128050519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Partial Updates of AUTOSAR Embedded Applications -- To What Extent? AUTOSAR嵌入式应用程序的部分更新-到什么程度?
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.18
Hélène Martorell, J. Fabre, M. Lauer, Matthieu Roy, R. Valentin
The AUTOSAR standard describes an architecture for embedded automotive systems. The lack of flexibility is a major drawback of this architecture and updates are not easily possible. In our work we explore the various facets of software updates in the context of AUTOSAR embedded applications. With few modifications that remain compatible with the development process, we propose specific concepts for updates. Such updates can be remotely achieved, for maintenance and/or evolution purposes. As functional updates may lead to safety mechanisms updates, we also highlight how safety mechanisms can be added or updated with different level of granularity. We illustrate these concepts and capabilities with a simple case study as a proof of concepts. We finally draw the lessons learnt from this work.
AUTOSAR标准描述了嵌入式汽车系统的架构。缺乏灵活性是这种架构的一个主要缺点,并且不容易进行更新。在我们的工作中,我们探索了AUTOSAR嵌入式应用中软件更新的各个方面。与开发过程保持兼容的修改很少,我们提出了更新的具体概念。出于维护和/或发展的目的,这些更新可以远程实现。由于功能更新可能导致安全机制的更新,我们还强调了如何以不同的粒度级别添加或更新安全机制。我们通过一个简单的案例研究来说明这些概念和功能。我们终于从这项工作中吸取了教训。
{"title":"Partial Updates of AUTOSAR Embedded Applications -- To What Extent?","authors":"Hélène Martorell, J. Fabre, M. Lauer, Matthieu Roy, R. Valentin","doi":"10.1109/EDCC.2015.18","DOIUrl":"https://doi.org/10.1109/EDCC.2015.18","url":null,"abstract":"The AUTOSAR standard describes an architecture for embedded automotive systems. The lack of flexibility is a major drawback of this architecture and updates are not easily possible. In our work we explore the various facets of software updates in the context of AUTOSAR embedded applications. With few modifications that remain compatible with the development process, we propose specific concepts for updates. Such updates can be remotely achieved, for maintenance and/or evolution purposes. As functional updates may lead to safety mechanisms updates, we also highlight how safety mechanisms can be added or updated with different level of granularity. We illustrate these concepts and capabilities with a simple case study as a proof of concepts. We finally draw the lessons learnt from this work.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reducing the Energy Footprint of a Distributed Consensus Algorithm 减少分布式共识算法的能源足迹
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.25
Jehan-Francois Pâris, D. Long
The Raft consensus algorithm is a new distributed consensus algorithm that is both easier to understand and more straightforward to implement than the older Paxos algorithm. Its major limitation is its high energy footprint. As it relies on majority consensus voting for deciding when to commit an update, Raft requires five participants to protect against two simultaneous failures. We propose two methods for reducing this huge energy footprint. Our first proposal consists of adjusting Raft quorums in a way that would allow updates to proceed with as few as two servers while requiring a larger quorum for electing a new leader. Our second proposal consists of replacing one or two of the five Raft servers with witnesses, that is, lightweight servers that maintain the same metadata as other servers but hold no data and can therefore run on very low-power hosts. We show that these substitutions have little impact on the cluster availability but very different impacts on the risks of incurring a data loss.
Raft共识算法是一种新的分布式共识算法,它比旧的Paxos算法更容易理解,也更容易实现。它的主要限制是它的高能量足迹。由于它依赖于多数共识投票来决定何时提交更新,因此Raft需要五个参与者来防止同时发生两次故障。我们提出了两种方法来减少这种巨大的能源足迹。我们的第一个建议是调整Raft的quorum,以允许在只有两台服务器的情况下进行更新,同时需要更大的quorum来选举一个新的leader。我们的第二个建议是用见证人替换五个Raft服务器中的一个或两个,也就是说,轻量级服务器与其他服务器维护相同的元数据,但不保存数据,因此可以在非常低功耗的主机上运行。我们表明,这些替换对集群可用性的影响很小,但对导致数据丢失的风险的影响却大不相同。
{"title":"Reducing the Energy Footprint of a Distributed Consensus Algorithm","authors":"Jehan-Francois Pâris, D. Long","doi":"10.1109/EDCC.2015.25","DOIUrl":"https://doi.org/10.1109/EDCC.2015.25","url":null,"abstract":"The Raft consensus algorithm is a new distributed consensus algorithm that is both easier to understand and more straightforward to implement than the older Paxos algorithm. Its major limitation is its high energy footprint. As it relies on majority consensus voting for deciding when to commit an update, Raft requires five participants to protect against two simultaneous failures. We propose two methods for reducing this huge energy footprint. Our first proposal consists of adjusting Raft quorums in a way that would allow updates to proceed with as few as two servers while requiring a larger quorum for electing a new leader. Our second proposal consists of replacing one or two of the five Raft servers with witnesses, that is, lightweight servers that maintain the same metadata as other servers but hold no data and can therefore run on very low-power hosts. We show that these substitutions have little impact on the cluster availability but very different impacts on the risks of incurring a data loss.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131854556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online Optimisation 基于贝叶斯网络和在线优化的云应用运行错误诊断
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.15
Xiwei Xu, Liming Zhu, Daniel W. Sun, An Binh Tran, I. Weber, Min Fu, L. Bass
Operations such as upgrade or redeployment are an important cause of system outages. Diagnosing such errors at runtime poses significant challenges. In this paper, we propose an error diagnosis approach using Bayesian Networks. Each node in the network captures the potential (root) causes of operational errors and its probability under different operational contexts. Once an operational error is detected, our diagnosis algorithm chooses a starting node, traverses the Bayesian Network and performs assertion checking associated with each node to confirm the error, retrieve further information and update the belief network. The next node in the network to check is selected through an online optimisation that minimises the overall availability risk considering diagnosis time and fault consequence. Our experiments show that the technique minimises the risk of faults significantly compared to other approaches in most cases. The diagnosis accuracy is high but also depends on the transient nature of a fault.
升级、重新部署等操作是导致系统中断的重要原因。在运行时诊断此类错误带来了重大挑战。本文提出了一种基于贝叶斯网络的故障诊断方法。网络中的每个节点捕获操作错误的潜在(根本)原因及其在不同操作上下文下的概率。一旦检测到操作错误,我们的诊断算法选择一个起始节点,遍历贝叶斯网络并执行与每个节点相关的断言检查以确认错误,检索进一步的信息并更新信念网络。通过在线优化选择网络中的下一个要检查的节点,考虑到诊断时间和故障后果,将总体可用性风险降至最低。我们的实验表明,在大多数情况下,与其他方法相比,该技术显着降低了故障风险。诊断精度高,但也依赖于故障的暂态性质。
{"title":"Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online Optimisation","authors":"Xiwei Xu, Liming Zhu, Daniel W. Sun, An Binh Tran, I. Weber, Min Fu, L. Bass","doi":"10.1109/EDCC.2015.15","DOIUrl":"https://doi.org/10.1109/EDCC.2015.15","url":null,"abstract":"Operations such as upgrade or redeployment are an important cause of system outages. Diagnosing such errors at runtime poses significant challenges. In this paper, we propose an error diagnosis approach using Bayesian Networks. Each node in the network captures the potential (root) causes of operational errors and its probability under different operational contexts. Once an operational error is detected, our diagnosis algorithm chooses a starting node, traverses the Bayesian Network and performs assertion checking associated with each node to confirm the error, retrieve further information and update the belief network. The next node in the network to check is selected through an online optimisation that minimises the overall availability risk considering diagnosis time and fault consequence. Our experiments show that the technique minimises the risk of faults significantly compared to other approaches in most cases. The diagnosis accuracy is high but also depends on the transient nature of a fault.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126011308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Composing Patterns to Construct Secure Systems 组合模式以构建安全系统
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.12
Paul Rimba, Liming Zhu, L. Bass, I. Kuz, S. Reeves
Building secure applications requires significant expertise. Secure platforms and security patterns have been proposed to alleviate this problem. However, correctly applying patterns to use platform features is still highly expertise-dependent. Patterns are informal and there is a gap between them and platform features. We propose the concept of reusable verified design fragments, which package security patterns and platform features and are verified to provide assurance about their security properties. Design fragments can be composed through four primitive tactics. The verification of the composed design against desired security properties is presented in an assurance case. We demonstrate our approach by securing a Continuous Deployment pipeline and show that the tactics are sufficient to compose design fragments into a secure system. Finally, we formally define composition tactics, which are intended to support the development of systems that are secure by construction.
构建安全的应用程序需要大量的专业知识。已经提出了安全平台和安全模式来缓解这个问题。然而,正确应用模式来使用平台特性仍然高度依赖于专业知识。模式是非正式的,它们和平台特性之间存在差距。我们提出了可重用的经过验证的设计片段的概念,这些设计片段封装了安全模式和平台特性,并经过验证以确保其安全属性。设计片段可以通过四种基本策略组成。在一个保证案例中,根据期望的安全属性对组合设计进行验证。我们通过保护持续部署管道来演示我们的方法,并展示这些策略足以将设计片段组合成一个安全的系统。最后,我们正式定义了组合策略,其目的是支持通过构造安全的系统的开发。
{"title":"Composing Patterns to Construct Secure Systems","authors":"Paul Rimba, Liming Zhu, L. Bass, I. Kuz, S. Reeves","doi":"10.1109/EDCC.2015.12","DOIUrl":"https://doi.org/10.1109/EDCC.2015.12","url":null,"abstract":"Building secure applications requires significant expertise. Secure platforms and security patterns have been proposed to alleviate this problem. However, correctly applying patterns to use platform features is still highly expertise-dependent. Patterns are informal and there is a gap between them and platform features. We propose the concept of reusable verified design fragments, which package security patterns and platform features and are verified to provide assurance about their security properties. Design fragments can be composed through four primitive tactics. The verification of the composed design against desired security properties is presented in an assurance case. We demonstrate our approach by securing a Continuous Deployment pipeline and show that the tactics are sufficient to compose design fragments into a secure system. Finally, we formally define composition tactics, which are intended to support the development of systems that are secure by construction.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129235522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms 故障注入在AUTOSAR安全机制评估中的有效应用
Pub Date : 2015-09-07 DOI: 10.1109/EDCC.2015.14
Thorsten Piper, Stefan Winter, N. Suri, T. Fuhrman
The automotive safety standard ISO 26262 strongly recommends the use of fault injection (FI) for the assessment of safety mechanisms that typically span composite dependability and real-time operations. However, with the standard providing very limited guidance on the actual design, implementation and execution of FI experiments, most AUTOSAR FI approaches use standard fault models (e.g., bit flips and data type based corruptions), and focus on using simulation environments. Unfortunately, the representation of timing faults using standard fault models, and the representation of real-time properties in simulation environments are hard, rendering both inadequate forthe comprehensive assessment of AUTOSAR's safety mechanisms. The actual development of ISO 26262 advocated FI is further hampered by the lack of representative software fault models and the lack of an openly accessible AUTOSAR FI framework. We address these gaps by (a) adapting the open source FI framework GRINDER to AUTOSAR and (b) showing how to effectively apply it for the assessment of AUTOSAR's safety mechanisms.
汽车安全标准ISO 26262强烈建议使用故障注入(FI)来评估通常跨越复合可靠性和实时操作的安全机制。然而,由于该标准对FI实验的实际设计、实现和执行提供了非常有限的指导,大多数AUTOSAR FI方法使用标准故障模型(例如,位翻转和基于数据类型的损坏),并专注于使用仿真环境。不幸的是,使用标准故障模型来表示时序故障,以及在仿真环境中表示实时属性都很困难,这对于全面评估AUTOSAR的安全机制来说都是不够的。ISO 26262所提倡的FI的实际发展由于缺乏代表性的软件故障模型和缺乏开放的AUTOSAR FI框架而受到进一步的阻碍。我们通过(a)将开源FI框架GRINDER应用于AUTOSAR和(b)展示如何有效地将其应用于AUTOSAR安全机制的评估来解决这些差距。
{"title":"On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms","authors":"Thorsten Piper, Stefan Winter, N. Suri, T. Fuhrman","doi":"10.1109/EDCC.2015.14","DOIUrl":"https://doi.org/10.1109/EDCC.2015.14","url":null,"abstract":"The automotive safety standard ISO 26262 strongly recommends the use of fault injection (FI) for the assessment of safety mechanisms that typically span composite dependability and real-time operations. However, with the standard providing very limited guidance on the actual design, implementation and execution of FI experiments, most AUTOSAR FI approaches use standard fault models (e.g., bit flips and data type based corruptions), and focus on using simulation environments. Unfortunately, the representation of timing faults using standard fault models, and the representation of real-time properties in simulation environments are hard, rendering both inadequate forthe comprehensive assessment of AUTOSAR's safety mechanisms. The actual development of ISO 26262 advocated FI is further hampered by the lack of representative software fault models and the lack of an openly accessible AUTOSAR FI framework. We address these gaps by (a) adapting the open source FI framework GRINDER to AUTOSAR and (b) showing how to effectively apply it for the assessment of AUTOSAR's safety mechanisms.","PeriodicalId":138826,"journal":{"name":"2015 11th European Dependable Computing Conference (EDCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2015 11th European Dependable Computing Conference (EDCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1