Pub Date : 2009-06-01DOI: 10.1109/DSN.2009.5270332
Zibin Zheng, Michael R. Lyu
Based on the framework of service-oriented architecture (SOA), complex distributed systems can be dynamically and automatically composed by integrating distributed Web services provided by different organizations, making dependability of the distributed SOA systems a big challenge. In this paper, we propose a QoS-aware fault tolerant middleware to attack this critical problem. Our middleware includes a user-collaborated QoS model, various fault tolerance strategies, and a context-aware algorithm in determining optimal fault tolerance strategy for both stateless and stateful Web services. The benefits of the proposed middleware are demonstrated by experiments, and the performance of the optimal fault tolerance strategy selection algorithm is investigated extensively. As illustrated by the experimental results, fault tolerance for the distributed SOA systems can be efficient, effective and optimized by the proposed middleware.
{"title":"A QoS-aware fault tolerant middleware for dependable service composition","authors":"Zibin Zheng, Michael R. Lyu","doi":"10.1109/DSN.2009.5270332","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270332","url":null,"abstract":"Based on the framework of service-oriented architecture (SOA), complex distributed systems can be dynamically and automatically composed by integrating distributed Web services provided by different organizations, making dependability of the distributed SOA systems a big challenge. In this paper, we propose a QoS-aware fault tolerant middleware to attack this critical problem. Our middleware includes a user-collaborated QoS model, various fault tolerance strategies, and a context-aware algorithm in determining optimal fault tolerance strategy for both stateless and stateful Web services. The benefits of the proposed middleware are demonstrated by experiments, and the performance of the optimal fault tolerance strategy selection algorithm is investigated extensively. As illustrated by the experimental results, fault tolerance for the distributed SOA systems can be efficient, effective and optimized by the proposed middleware.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/DSN.2009.5270358
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, H. Zhou, Z. Fu
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the major family of security protocols for Wireless LAN, as well as the Return Routability of Mobile IPv6, an emerging lightweight security protocol in new IPv6 infrastructure. DoS attacks on PEAP, one popular TLS-based EAP protocol were performed and tested on a major university's wireless network, and the attacks were highly successful. We further tested the scalability of our attack through a series of ns-2 simulations. Countermeasures for detection of such attacks and improvements of the protocols to overcome these types of DoS attacks are also proposed and verified experimentally.
{"title":"Exception triggered DoS attacks on wireless networks","authors":"Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, H. Zhou, Z. Fu","doi":"10.1109/DSN.2009.5270358","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270358","url":null,"abstract":"Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, we show that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the major family of security protocols for Wireless LAN, as well as the Return Routability of Mobile IPv6, an emerging lightweight security protocol in new IPv6 infrastructure. DoS attacks on PEAP, one popular TLS-based EAP protocol were performed and tested on a major university's wireless network, and the attacks were highly successful. We further tested the scalability of our attack through a series of ns-2 simulations. Countermeasures for detection of such attacks and improvements of the protocols to overcome these types of DoS attacks are also proposed and verified experimentally.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130800727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/DSN.2009.5270316
Jennifer Black, Philip Koopman
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA) for elaborating system safety goals in composite systems. We now provide mathematical definitions of emergent and composable system behaviors in the context of formal specifications and ICPA, and identify useful special cases in which partial decomposition of emergent safety goals is possible. We apply ICPA to a semi-autonomous automotive system to identify safety goals for key subsystems, and then monitor the system and subsystem goals at run-time in an implementation of the vehicle. Although false negatives at the subsystem level indicate the subgoals do not fully compose the original safety goal, some system-level go al violations are detected by subsystem monitors. In addition, monitoring at both the system and subsystem level has identified certain safety-related errors that may be imperceptible to system testers.
{"title":"System safety as an emergent property in composite systems","authors":"Jennifer Black, Philip Koopman","doi":"10.1109/DSN.2009.5270316","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270316","url":null,"abstract":"Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA) for elaborating system safety goals in composite systems. We now provide mathematical definitions of emergent and composable system behaviors in the context of formal specifications and ICPA, and identify useful special cases in which partial decomposition of emergent safety goals is possible. We apply ICPA to a semi-autonomous automotive system to identify safety goals for key subsystems, and then monitor the system and subsystem goals at run-time in an implementation of the vehicle. Although false negatives at the subsystem level indicate the subgoals do not fully compose the original safety goal, some system-level go al violations are detected by subsystem monitors. In addition, monitoring at both the system and subsystem level has identified certain safety-related errors that may be imperceptible to system testers.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/dsn.2009.5270288
José Manuel Cantera Fonseca, Marco Vieira, H. Madeira
Dr. William C. Carter was a key figure in the formation and development of the field of dependable computing and fault tolerance. His career spanned over four decades, from programming , debugging, and recovery in ENlAC, through reliability, availability and serviceability during the evolution and definition of IBM mainframes. In particular, he took great interest in the future of the field and was instrumental in promoting the work of young contributors. It was characteristic of Bill to take the initiative in reaching out to students and younger colleagues. Despite the demands of his own career, he knew the value of taking the time to encourage, mentor, and inspire newcomers to the field. The William C. Carter Award has been presented annually since 1997, and was established by the IEEE Technical Committee on Fault-Tolerant Computing (TC-FTC) together with the IFIP Working Group on Dependable Computing and Fault Tolerance (WG lOA). The award is intended to honor and carry on Dr. Carter's legacy by recognizing an outstanding paper based on a graduate dissertation. To qualify, a paper based on a student's dissertation must have been submitted as a regular conference paper to DSN, with the student as the first author. Both current graduate students and former graduate students, no more than two years past the completion of their dissertation, are eligible. All Carter Award submissions accepted as regular DCCS and PDS papers were evaluated by the DSN Steering Committee.
William C. Carter博士是可靠计算和容错领域形成和发展的关键人物。他的职业生涯跨越了40多年,从ENlAC的编程、调试和恢复,到IBM大型机发展和定义期间的可靠性、可用性和可服务性。特别是,他对该领域的未来非常感兴趣,并在促进年轻贡献者的工作方面发挥了重要作用。主动接触学生和年轻同事是比尔的特点。尽管他自己的职业需要,但他知道花时间鼓励、指导和激励这个领域的新人的价值。William C. Carter奖自1997年以来每年颁发一次,由IEEE容错计算技术委员会(TC-FTC)和IFIP可靠计算和容错工作组(WG lOA)共同设立。该奖项旨在通过表彰基于研究生论文的杰出论文来表彰和继承卡特博士的遗产。要获得资格,基于学生论文的论文必须作为常规会议论文提交给DSN,学生作为第一作者。在读研究生和以前的研究生,在完成论文后不超过两年的,都有资格。所有作为常规DCCS和PDS文件接受的卡特奖提交的文件都由DSN指导委员会进行评估。
{"title":"William C. Carter Award","authors":"José Manuel Cantera Fonseca, Marco Vieira, H. Madeira","doi":"10.1109/dsn.2009.5270288","DOIUrl":"https://doi.org/10.1109/dsn.2009.5270288","url":null,"abstract":"Dr. William C. Carter was a key figure in the formation and development of the field of dependable computing and fault tolerance. His career spanned over four decades, from programming , debugging, and recovery in ENlAC, through reliability, availability and serviceability during the evolution and definition of IBM mainframes. In particular, he took great interest in the future of the field and was instrumental in promoting the work of young contributors. It was characteristic of Bill to take the initiative in reaching out to students and younger colleagues. Despite the demands of his own career, he knew the value of taking the time to encourage, mentor, and inspire newcomers to the field. The William C. Carter Award has been presented annually since 1997, and was established by the IEEE Technical Committee on Fault-Tolerant Computing (TC-FTC) together with the IFIP Working Group on Dependable Computing and Fault Tolerance (WG lOA). The award is intended to honor and carry on Dr. Carter's legacy by recognizing an outstanding paper based on a graduate dissertation. To qualify, a paper based on a student's dissertation must have been submitted as a regular conference paper to DSN, with the student as the first author. Both current graduate students and former graduate students, no more than two years past the completion of their dissertation, are eligible. All Carter Award submissions accepted as regular DCCS and PDS papers were evaluated by the DSN Steering Committee.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125539398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}