首页 > 最新文献

2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Locality matters: Reducing Internet traffic graphs using location analysis 位置问题:使用位置分析减少互联网流量图表
A. Berger, Stefan Rührup, W. Gansterer, O. Jung
The representation of Internet traffic as connection graphs augments anomaly detection systems by providing insight on the structural connection properties, i.e., who-talks-to-whom. However, these graphs are extremely large and one has to decide in advance on which aspect to focus. In the context of malware detection, this is difficult as malware often mimics legitimate traffic. In this paper, we present a statistical approach for extracting the typical traffic destinations for a set of monitored hosts, and derive a reduced graph that contains only connections that are anomalous for that host. This graph can then be analyzed efficiently. Our system is designed to scale to thousands of monitored hosts. We evaluate our approach using a data set from a real network, and show that we can reliably detect injected malware activity.
将互联网流量表示为连接图,通过提供对结构连接属性(即谁与谁对话)的洞察,增强了异常检测系统。然而,这些图形非常大,必须提前决定关注哪个方面。在恶意软件检测的上下文中,这是困难的,因为恶意软件经常模仿合法流量。在本文中,我们提出了一种统计方法来提取一组被监控主机的典型流量目的地,并推导出一个仅包含该主机异常连接的简化图。然后可以有效地分析这个图。我们的系统被设计成可扩展到数千个被监控的主机。我们使用来自真实网络的数据集来评估我们的方法,并表明我们可以可靠地检测到注入的恶意软件活动。
{"title":"Locality matters: Reducing Internet traffic graphs using location analysis","authors":"A. Berger, Stefan Rührup, W. Gansterer, O. Jung","doi":"10.1109/DSN.2013.6575365","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575365","url":null,"abstract":"The representation of Internet traffic as connection graphs augments anomaly detection systems by providing insight on the structural connection properties, i.e., who-talks-to-whom. However, these graphs are extremely large and one has to decide in advance on which aspect to focus. In the context of malware detection, this is difficult as malware often mimics legitimate traffic. In this paper, we present a statistical approach for extracting the typical traffic destinations for a set of monitored hosts, and derive a reduced graph that contains only connections that are anomalous for that host. This graph can then be analyzed efficiently. Our system is designed to scale to thousands of monitored hosts. We evaluate our approach using a data set from a real network, and show that we can reliably detect injected malware activity.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intrusion detection and honeypots in nested virtualization environments 嵌套虚拟化环境中的入侵检测和蜜罐
M. Beham, Marius Vlad, Hans P. Reiser
Several research projects in the past have built intrusion detection systems and honeypot architectures based on virtual machine introspection (VMI). These systems directly benefit from the use of virtualization technology. The VMI approach, however, requires direct interaction with the virtual machine monitor, and typically is not available to clients of current public clouds. Recently, nested virtualization has gained popularity in research as an approach that could enable cloud customers to use virtualization-based solutions within a cloud by nesting two virtual machine monitors, with the inner one under control of the client. In this paper, we compare the performance of existing nested-virtualization solutions and analyze the impact of the performance overhead on VMI-based intrusion detection and honeypot systems.
过去的一些研究项目已经建立了基于虚拟机自省(VMI)的入侵检测系统和蜜罐体系结构。这些系统直接受益于虚拟化技术的使用。然而,VMI方法需要与虚拟机监视器直接交互,并且通常不适用于当前公共云的客户机。最近,嵌套虚拟化作为一种方法在研究中越来越受欢迎,这种方法可以使云客户通过嵌套两个虚拟机监视器来在云中使用基于虚拟化的解决方案,其中内部的一个由客户端控制。在本文中,我们比较了现有的嵌套虚拟化解决方案的性能,并分析了性能开销对基于vmi的入侵检测和蜜罐系统的影响。
{"title":"Intrusion detection and honeypots in nested virtualization environments","authors":"M. Beham, Marius Vlad, Hans P. Reiser","doi":"10.1109/DSN.2013.6575329","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575329","url":null,"abstract":"Several research projects in the past have built intrusion detection systems and honeypot architectures based on virtual machine introspection (VMI). These systems directly benefit from the use of virtualization technology. The VMI approach, however, requires direct interaction with the virtual machine monitor, and typically is not available to clients of current public clouds. Recently, nested virtualization has gained popularity in research as an approach that could enable cloud customers to use virtualization-based solutions within a cloud by nesting two virtual machine monitors, with the inner one under control of the client. In this paper, we compare the performance of existing nested-virtualization solutions and analyze the impact of the performance overhead on VMI-based intrusion detection and honeypot systems.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Detecting malicious landing pages in Malware Distribution Networks 检测恶意软件分发网络中的恶意着陆页
G. Wang, J. W. Stokes, Cormac Herley, D. Felstead
Drive-by download attacks attempt to compromise a victim's computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, intermediate redirection servers, and exploit servers which attempt the compromise. In this paper, we present a novel approach to discovering the landing pages that lead to drive-by downloads. Starting from partial knowledge of a given collection of MDNs we identify the malicious content on their landing pages using multiclass feature selection. We then query the webpage cache of a commercial search engine to identify landing pages containing the same or similar content. In this way we are able to identify previously unknown landing pages belonging to already identified MDNs, which allows us to expand our understanding of the MDN. We explore using both a rule-based and classifier approach to identifying potentially malicious landing pages. We build both systems and independently verify using a high-interaction honeypot that the newly identified landing pages indeed attempt drive-by downloads. For the rule-based system 57% of the landing pages predicted as malicious are confirmed, and this success rate remains constant in two large trials spaced five months apart. This extends the known footprint of the MDNs studied by 17%. The classifier-based system is less successful, and we explore possible reasons.
飞车下载攻击试图通过浏览器漏洞破坏受害者的计算机。通常,它们是从恶意软件分发网络(mdn)发起的,该网络由吸引流量的着陆页面、中间重定向服务器和企图妥协的漏洞服务器组成。在本文中,我们提出了一种新的方法来发现导致驱动下载的登陆页面。从给定mdn集合的部分知识开始,我们使用多类特征选择识别其着陆页面上的恶意内容。然后,我们查询一个商业搜索引擎的网页缓存,以确定包含相同或类似内容的登陆页面。通过这种方式,我们能够识别属于已经确定的MDN的以前未知的着陆页,这使我们能够扩展我们对MDN的理解。我们探索使用基于规则和分类器的方法来识别潜在的恶意着陆页面。我们构建了这两个系统,并使用高交互蜜罐独立验证新识别的登陆页面确实试图通过下载。对于基于规则的系统,57%被预测为恶意的登陆页面被确认,并且在相隔五个月的两次大型试验中,这一成功率保持不变。这将所研究的mdn的已知足迹扩展了17%。基于分类器的系统不太成功,我们探讨了可能的原因。
{"title":"Detecting malicious landing pages in Malware Distribution Networks","authors":"G. Wang, J. W. Stokes, Cormac Herley, D. Felstead","doi":"10.1109/DSN.2013.6575316","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575316","url":null,"abstract":"Drive-by download attacks attempt to compromise a victim's computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, intermediate redirection servers, and exploit servers which attempt the compromise. In this paper, we present a novel approach to discovering the landing pages that lead to drive-by downloads. Starting from partial knowledge of a given collection of MDNs we identify the malicious content on their landing pages using multiclass feature selection. We then query the webpage cache of a commercial search engine to identify landing pages containing the same or similar content. In this way we are able to identify previously unknown landing pages belonging to already identified MDNs, which allows us to expand our understanding of the MDN. We explore using both a rule-based and classifier approach to identifying potentially malicious landing pages. We build both systems and independently verify using a high-interaction honeypot that the newly identified landing pages indeed attempt drive-by downloads. For the rule-based system 57% of the landing pages predicted as malicious are confirmed, and this success rate remains constant in two large trials spaced five months apart. This extends the known footprint of the MDNs studied by 17%. The classifier-based system is less successful, and we explore possible reasons.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Implementing the ADVISE security modeling formalism in Möbius 在Möbius中实现ADVISE安全建模形式
Michael D. Ford, K. Keefe, E. LeMay, W. Sanders, Carol Muehrcke
The ADversary VIew Security Evaluation (ADVISE) model formalism provides a system security model from the perspective of an adversary. An ADVISE atomic model consists of an attack execution graph (AEG) composed of attack steps, system state variables, and attack goals, as well as an adversary profile that defines the abilities and interests of a particular adversary. The ADVISE formalism has been implemented as a Möbius atomic model formalism in order to leverage the existing set of mature modeling formalisms and solution techniques offered by Möbius. This tool paper explains the ADVISE implementation in Möbius and provides technical details for Möbius users who want to use ADVISE either alone or in combination with other modeling formalisms provided by Möbius.
敌手视图安全评估(ADVISE)模型形式主义从敌手的角度提供了一个系统安全模型。ADVISE原子模型由由攻击步骤、系统状态变量和攻击目标组成的攻击执行图(AEG)以及定义特定攻击者的能力和兴趣的攻击者概要文件组成。ADVISE形式被实现为Möbius原子模型形式,以便利用Möbius提供的现有的成熟建模形式和解决方案技术集。这篇工具论文解释了Möbius中的ADVISE实现,并为希望单独使用ADVISE或与Möbius提供的其他建模形式结合使用ADVISE的Möbius用户提供了技术细节。
{"title":"Implementing the ADVISE security modeling formalism in Möbius","authors":"Michael D. Ford, K. Keefe, E. LeMay, W. Sanders, Carol Muehrcke","doi":"10.1109/DSN.2013.6575362","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575362","url":null,"abstract":"The ADversary VIew Security Evaluation (ADVISE) model formalism provides a system security model from the perspective of an adversary. An ADVISE atomic model consists of an attack execution graph (AEG) composed of attack steps, system state variables, and attack goals, as well as an adversary profile that defines the abilities and interests of a particular adversary. The ADVISE formalism has been implemented as a Möbius atomic model formalism in order to leverage the existing set of mature modeling formalisms and solution techniques offered by Möbius. This tool paper explains the ADVISE implementation in Möbius and provides technical details for Möbius users who want to use ADVISE either alone or in combination with other modeling formalisms provided by Möbius.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120962511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
CloudPD: Problem determination and diagnosis in shared dynamic clouds CloudPD:共享动态云中的问题确定和诊断
Bikash Sharma, P. Jayachandran, Akshat Verma, C. Das
In this work, we address problem determination in virtualized clouds. We show that high dynamism, resource sharing, frequent reconfiguration, high propensity to faults and automated management introduce significant new challenges towards fault diagnosis in clouds. Towards this, we propose CloudPD, a fault management framework for clouds. CloudPD leverages (i) a canonical representation of the operating environment to quantify the impact of sharing; (ii) an online learning process to tackle dynamism; (iii) a correlation-based performance models for higher detection accuracy; and (iv) an integrated end-to-end feedback loop to synergize with a cloud management ecosystem. Using a prototype implementation with cloud representative batch and transactional workloads like Hadoop, Olio and RUBiS, it is shown that CloudPD detects and diagnoses faults with low false positives (<; 16%) and high accuracy of 88%, 83% and 83%, respectively. In an enterprise trace-based case study, CloudPD diagnosed anomalies within 30 seconds and with an accuracy of 77%, demonstrating its effectiveness in real-life operations.
在这项工作中,我们将讨论虚拟化云中的问题确定。研究表明,高动态性、资源共享、频繁重构、高故障倾向和自动化管理为云计算故障诊断带来了重大的新挑战。为此,我们提出了云故障管理框架CloudPD。CloudPD利用(i)操作环境的规范表示来量化共享的影响;(ii)在线学习过程,以解决动态问题;(iii)基于相关性的性能模型,以提高检测精度;(iv)集成的端到端反馈回路,与云管理生态系统协同作用。使用具有云代表性的批处理和事务性工作负载(如Hadoop, Olio和RUBiS)的原型实现,表明CloudPD检测和诊断故障的误报率低(<;准确率分别为88%、83%和83%。在一个基于企业跟踪的案例研究中,CloudPD在30秒内诊断出异常,准确率达到77%,证明了其在实际操作中的有效性。
{"title":"CloudPD: Problem determination and diagnosis in shared dynamic clouds","authors":"Bikash Sharma, P. Jayachandran, Akshat Verma, C. Das","doi":"10.1109/DSN.2013.6575298","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575298","url":null,"abstract":"In this work, we address problem determination in virtualized clouds. We show that high dynamism, resource sharing, frequent reconfiguration, high propensity to faults and automated management introduce significant new challenges towards fault diagnosis in clouds. Towards this, we propose CloudPD, a fault management framework for clouds. CloudPD leverages (i) a canonical representation of the operating environment to quantify the impact of sharing; (ii) an online learning process to tackle dynamism; (iii) a correlation-based performance models for higher detection accuracy; and (iv) an integrated end-to-end feedback loop to synergize with a cloud management ecosystem. Using a prototype implementation with cloud representative batch and transactional workloads like Hadoop, Olio and RUBiS, it is shown that CloudPD detects and diagnoses faults with low false positives (<; 16%) and high accuracy of 88%, 83% and 83%, respectively. In an enterprise trace-based case study, CloudPD diagnosed anomalies within 30 seconds and with an accuracy of 77%, demonstrating its effectiveness in real-life operations.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing 跨越阈值:通过序贯假设检验检测网络不法行为
Srinivas Krishnan, Teryl Taylor, F. Monrose, J. McHugh
The domain name system plays a vital role in the dependability and security of modern network. Unfortunately, it has also been widely misused for nefarious activities. Recently, attackers have turned their attention to the use of algorithmically generated domain names (AGDs) in an effort to circumvent network defenses. However, because such domain names are increasingly being used in benign applications, this transition has significant implications for techniques that classify AGDs based solely on the format of a domain name. To highlight the challenges they face, we examine contemporary approaches and demonstrate their limitations. We address these shortcomings by proposing an online form of sequential hypothesis testing that classifies clients based solely on the non-existent (NX) responses they elicit. Our evaluations on real-world data show that we outperform existing approaches, and for the vast majority of cases, we detect malware before they are able to successfully rendezvous with their command and control centers.
域名系统对现代网络的可靠性和安全性起着至关重要的作用。不幸的是,它也被广泛滥用于邪恶活动。最近,攻击者将注意力转向使用算法生成的域名(agd)来绕过网络防御。然而,由于这些域名越来越多地用于良性应用程序,因此这种转变对仅根据域名格式对agd进行分类的技术具有重要意义。为了突出他们所面临的挑战,我们研究了当代的方法并展示了它们的局限性。我们通过提出一种在线形式的顺序假设检验来解决这些缺点,该检验仅根据客户引出的不存在的(NX)反应对客户进行分类。我们对真实世界数据的评估表明,我们优于现有的方法,并且在绝大多数情况下,我们在恶意软件能够成功地与他们的指挥和控制中心会合之前检测到它们。
{"title":"Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing","authors":"Srinivas Krishnan, Teryl Taylor, F. Monrose, J. McHugh","doi":"10.1109/DSN.2013.6575364","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575364","url":null,"abstract":"The domain name system plays a vital role in the dependability and security of modern network. Unfortunately, it has also been widely misused for nefarious activities. Recently, attackers have turned their attention to the use of algorithmically generated domain names (AGDs) in an effort to circumvent network defenses. However, because such domain names are increasingly being used in benign applications, this transition has significant implications for techniques that classify AGDs based solely on the format of a domain name. To highlight the challenges they face, we examine contemporary approaches and demonstrate their limitations. We address these shortcomings by proposing an online form of sequential hypothesis testing that classifies clients based solely on the non-existent (NX) responses they elicit. Our evaluations on real-world data show that we outperform existing approaches, and for the vast majority of cases, we detect malware before they are able to successfully rendezvous with their command and control centers.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132568412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
WirelessHART modeling and performance evaluation 无线shart建模和性能评估
Anne Remke, Xian-You Wu
In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for wireless process supervision and control has received notable academic attention. This paper models WirelessHART networks with link failures using Discrete-time Markov chains and evaluates the network performance in a typical WirelessHART environment with respect to delay and reachability. The evaluation shows that although the performance of WirelessHART is influenced by several factors, it is capable to deliver reliable service in typical industrial environments. The proposed model can also be used to predict path performance and to provide routing suggestions.
在过程工业中,有线监控网络越来越多地被无线系统所取代。无线通信不可避免地会带来时间延迟和消息丢失,这可能会降低系统的可靠性和性能。WirelessHART作为国际上第一个无线过程监控标准,受到了学术界的广泛关注。本文利用离散时间马尔可夫链对具有链路故障的WirelessHART网络进行了建模,并对典型WirelessHART环境下的网络性能进行了时延和可达性评估。评估结果表明,尽管WirelessHART的性能受到多种因素的影响,但它能够在典型的工业环境中提供可靠的服务。该模型还可用于预测路径性能并提供路由建议。
{"title":"WirelessHART modeling and performance evaluation","authors":"Anne Remke, Xian-You Wu","doi":"10.1109/DSN.2013.6575358","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575358","url":null,"abstract":"In process industries wired supervisory and control networks are more and more replaced by wireless systems. Wireless communication inevitably introduces time delays and message losses, which may degrade the system reliability and performance. WirelessHART, as the first international standard for wireless process supervision and control has received notable academic attention. This paper models WirelessHART networks with link failures using Discrete-time Markov chains and evaluates the network performance in a typical WirelessHART environment with respect to delay and reachability. The evaluation shows that although the performance of WirelessHART is influenced by several factors, it is capable to deliver reliable service in typical industrial environments. The proposed model can also be used to predict path performance and to provide routing suggestions.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133792265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dependability models for designing disaster tolerant cloud computing systems 设计容灾云计算系统的可靠性模型
B. Silva, P. Maciel, E. Tavares, A. Zimmermann
Hundreds of natural disasters occur in many parts of the world every year, causing billions of dollars in damages. This fact contrasts with the high availability requirement of cloud computing systems, and, to protect such systems from unforeseen catastrophe, a recovery plan requires the utilization of different data centers located far enough apart. However, the time to migrate a VM from a data center to another increases due to distance. This work presents dependability models for evaluating distributed cloud computing systems deployed into multiple data centers considering disaster occurrence. Additionally, we present a case study which evaluates several scenarios with different VM migration times and distances between data centers.
每年在世界许多地方发生数百起自然灾害,造成数十亿美元的损失。这一事实与云计算系统的高可用性要求形成对比,并且,为了保护此类系统免受不可预见的灾难,恢复计划需要利用相距足够远的不同数据中心。但是,由于距离的关系,虚拟机从一个数据中心迁移到另一个数据中心的时间会增加。这项工作提出了可靠性模型,用于评估部署到多个数据中心的分布式云计算系统,考虑到灾难的发生。此外,我们还提供了一个案例研究,该案例研究评估了具有不同VM迁移时间和数据中心之间距离的几种场景。
{"title":"Dependability models for designing disaster tolerant cloud computing systems","authors":"B. Silva, P. Maciel, E. Tavares, A. Zimmermann","doi":"10.1109/DSN.2013.6575323","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575323","url":null,"abstract":"Hundreds of natural disasters occur in many parts of the world every year, causing billions of dollars in damages. This fact contrasts with the high availability requirement of cloud computing systems, and, to protect such systems from unforeseen catastrophe, a recovery plan requires the utilization of different data centers located far enough apart. However, the time to migrate a VM from a data center to another increases due to distance. This work presents dependability models for evaluating distributed cloud computing systems deployed into multiple data centers considering disaster occurrence. Additionally, we present a case study which evaluates several scenarios with different VM migration times and distances between data centers.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129754694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
SIDE: Isolated and efficient execution of unmodified device drivers 方:隔离和有效的执行未修改的设备驱动程序
Yifeng Sun, T. Chiueh
Buggy device drivers are a major threat to the reliability of their host operating system. There have been myriad attempts to protect the kernel, but most of them either required driver modifications or incur substantial performance overhead. This paper describes an isolated device driver execution system called SIDE (Streamlined Isolated Driver Execution), which focuses specifically on unmodified device drivers and strives to avoid changing the existing kernel code as much as possible. SIDE exploits virtual memory hardware to set up a device driver execution environment that is compatible with existing device drivers and yet is fully isolated from the kernel. SIDE is able to run an unmodified device driver for a Gigabit Ethernet NIC and the latency and throughput penalty is kept under 1% when augmented with a set of performance optimizations designed to reduce the number of protection domain crossings between an isolated device driver and the kernel.
有缺陷的设备驱动程序是对其主机操作系统可靠性的主要威胁。人们曾无数次尝试保护内核,但其中大多数要么需要修改驱动程序,要么会产生大量的性能开销。本文描述了一个称为SIDE (Streamlined isolated driver execution)的隔离设备驱动程序执行系统,它特别关注未修改的设备驱动程序,并尽可能避免更改现有的内核代码。SIDE利用虚拟内存硬件来建立一个设备驱动程序执行环境,该环境与现有的设备驱动程序兼容,但与内核完全隔离。SIDE能够为千兆以太网网卡运行未经修改的设备驱动程序,并且通过一组旨在减少隔离设备驱动程序和内核之间保护域交叉数量的性能优化,将延迟和吞吐量损失保持在1%以下。
{"title":"SIDE: Isolated and efficient execution of unmodified device drivers","authors":"Yifeng Sun, T. Chiueh","doi":"10.1109/DSN.2013.6575348","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575348","url":null,"abstract":"Buggy device drivers are a major threat to the reliability of their host operating system. There have been myriad attempts to protect the kernel, but most of them either required driver modifications or incur substantial performance overhead. This paper describes an isolated device driver execution system called SIDE (Streamlined Isolated Driver Execution), which focuses specifically on unmodified device drivers and strives to avoid changing the existing kernel code as much as possible. SIDE exploits virtual memory hardware to set up a device driver execution environment that is compatible with existing device drivers and yet is fully isolated from the kernel. SIDE is able to run an unmodified device driver for a Gigabit Ethernet NIC and the latency and throughput penalty is kept under 1% when augmented with a set of performance optimizations designed to reduce the number of protection domain crossings between an isolated device driver and the kernel.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124396337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An algorithmic approach to error localization and partial recomputation for low-overhead fault tolerance 基于低开销容错的错误定位和部分重计算算法
Joseph Sloan, Rakesh Kumar, G. Bronevetsky
The increasing size and complexity of massively parallel systems (e.g. HPC systems) is making it increasingly likely that individual circuits will produce erroneous results. For this reason, novel fault tolerance approaches are increasingly needed. Prior fault tolerance approaches often rely on checkpoint-rollback based schemes. Unfortunately, such schemes are primarily limited to rare error event scenarios as the overheads of such schemes become prohibitive if faults are common. In this paper, we propose a novel approach for algorithmic correction of faulty application outputs. The key insight for this approach is that even under high error scenarios, even if the result of an algorithm is erroneous, most of it is correct. Instead of simply rolling back to the most recent checkpoint and repeating the entire segment of computation, our novel resilience approach uses algorithmic error localization and partial recomputation to efficiently correct the corrupted results. We evaluate our approach in the specific algorithmic scenario of linear algebra operations, focusing on matrix-vector multiplication (MVM) and iterative linear solvers. We develop a novel technique for localizing errors in MVM and show how to achieve partial recomputation within this algorithm, and demonstrate that this approach both improves the performance of the Conjugate Gradient solver in high error scenarios by 3x-4x and increases the probability that it completes successfully by up to 60% with parallel experiments up to 100 nodes.
大规模并行系统(如高性能计算系统)的尺寸和复杂性的增加使得单个电路产生错误结果的可能性越来越大。因此,越来越需要新的容错方法。先前的容错方法通常依赖于基于检查点回滚的方案。不幸的是,这种方案主要局限于罕见的错误事件场景,因为如果错误很常见,这种方案的开销就会变得令人望而却步。在本文中,我们提出了一种新的算法校正错误的应用输出。这种方法的关键见解是,即使在高误差的情况下,即使算法的结果是错误的,大部分也是正确的。我们的新弹性方法不是简单地回滚到最近的检查点并重复整个计算段,而是使用算法错误定位和部分重新计算来有效地纠正损坏的结果。我们在线性代数运算的特定算法场景中评估我们的方法,重点是矩阵向量乘法(MVM)和迭代线性求解器。我们开发了一种在MVM中定位误差的新技术,并展示了如何在该算法中实现部分重计算,并证明该方法将共轭梯度求解器在高误差场景下的性能提高了3 -4倍,并且在并行实验多达100个节点时将其成功完成的概率提高了60%。
{"title":"An algorithmic approach to error localization and partial recomputation for low-overhead fault tolerance","authors":"Joseph Sloan, Rakesh Kumar, G. Bronevetsky","doi":"10.1109/DSN.2013.6575309","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575309","url":null,"abstract":"The increasing size and complexity of massively parallel systems (e.g. HPC systems) is making it increasingly likely that individual circuits will produce erroneous results. For this reason, novel fault tolerance approaches are increasingly needed. Prior fault tolerance approaches often rely on checkpoint-rollback based schemes. Unfortunately, such schemes are primarily limited to rare error event scenarios as the overheads of such schemes become prohibitive if faults are common. In this paper, we propose a novel approach for algorithmic correction of faulty application outputs. The key insight for this approach is that even under high error scenarios, even if the result of an algorithm is erroneous, most of it is correct. Instead of simply rolling back to the most recent checkpoint and repeating the entire segment of computation, our novel resilience approach uses algorithmic error localization and partial recomputation to efficiently correct the corrupted results. We evaluate our approach in the specific algorithmic scenario of linear algebra operations, focusing on matrix-vector multiplication (MVM) and iterative linear solvers. We develop a novel technique for localizing errors in MVM and show how to achieve partial recomputation within this algorithm, and demonstrate that this approach both improves the performance of the Conjugate Gradient solver in high error scenarios by 3x-4x and increases the probability that it completes successfully by up to 60% with parallel experiments up to 100 nodes.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114824444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
期刊
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1