首页 > 最新文献

International Conference on Dependable Systems and Networks, 2004最新文献

英文 中文
Tolerating hard faults in microprocessor array structures 微处理器阵列结构的硬故障容忍度
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311876
Fred A. Bower, Paul G. Shealy, S. Ozev, Daniel J. Sorin
In this paper, we present a hardware technique, called self-repairing array structures (SRAS), for masking hard faults in microprocessor array structures, such as the reorder buffer and branch history table. SRAS masks errors that could otherwise lead to slow system recoveries. To detect row errors, every write to a row is mirrored to a dedicated "check row". We then read out both the written row and check row and compare their results. To correct errors, SRAS maps out faulty array rows with a level of indirection.
在本文中,我们提出了一种硬件技术,称为自修复阵列结构(SRAS),用于掩盖微处理器阵列结构中的硬故障,如重排序缓冲区和分支历史表。SRAS屏蔽了可能导致系统恢复缓慢的错误。为了检测行错误,对一行的每次写入都会镜像到专用的“检查行”。然后我们读出写行和校验行,并比较它们的结果。为了纠正错误,SRAS用一定程度的间接映射出有错误的数组行。
{"title":"Tolerating hard faults in microprocessor array structures","authors":"Fred A. Bower, Paul G. Shealy, S. Ozev, Daniel J. Sorin","doi":"10.1109/DSN.2004.1311876","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311876","url":null,"abstract":"In this paper, we present a hardware technique, called self-repairing array structures (SRAS), for masking hard faults in microprocessor array structures, such as the reorder buffer and branch history table. SRAS masks errors that could otherwise lead to slow system recoveries. To detect row errors, every write to a row is mirrored to a dedicated \"check row\". We then read out both the written row and check row and compare their results. To correct errors, SRAS maps out faulty array rows with a level of indirection.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125059763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
A framework for evaluating storage system dependability 用于评估存储系统可靠性的框架
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311958
K. Keeton, A. Merchant
Designing storage systems to provide business continuity in the face of failures requires the use of various data protection techniques, such as backup, remote mirroring, point-in-time copies and vaulting, often in concert. Predicting the dependability provided by such compositions of techniques is difficult, yet necessary for dependable system design. We present a framework for evaluating the dependability of data storage systems, including both individual data protection techniques and their compositions. Our models estimate storage system recovery time, data loss, normal mode system utilization and operational costs under a variety of failure scenarios. We demonstrate the effectiveness of these modeling techniques through a case study using real-world storage system designs and workloads.
设计存储系统以在面对故障时提供业务连续性需要使用各种数据保护技术,例如备份、远程镜像、时间点副本和vault,这些技术通常是一致的。预测这些技术组合所提供的可靠性是困难的,但对于可靠的系统设计是必要的。我们提出了一个评估数据存储系统可靠性的框架,包括个人数据保护技术和它们的组成。我们的模型估计了存储系统在各种故障场景下的恢复时间、数据丢失、正常模式系统利用率和运行成本。我们通过使用实际存储系统设计和工作负载的案例研究来演示这些建模技术的有效性。
{"title":"A framework for evaluating storage system dependability","authors":"K. Keeton, A. Merchant","doi":"10.1109/DSN.2004.1311958","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311958","url":null,"abstract":"Designing storage systems to provide business continuity in the face of failures requires the use of various data protection techniques, such as backup, remote mirroring, point-in-time copies and vaulting, often in concert. Predicting the dependability provided by such compositions of techniques is difficult, yet necessary for dependable system design. We present a framework for evaluating the dependability of data storage systems, including both individual data protection techniques and their compositions. Our models estimate storage system recovery time, data loss, normal mode system utilization and operational costs under a variety of failure scenarios. We demonstrate the effectiveness of these modeling techniques through a case study using real-world storage system designs and workloads.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129926142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A portable implementation framework for intrusion-resilient database management systems 一个可移植的抗入侵数据库管理系统的实现框架
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311914
A. Smirnov, T. Chiueh
An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or a human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs: PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.
具有入侵弹性的数据库管理系统是在受到恶意攻击或人为错误损害后能够恢复其一致性的系统。更具体地说,入侵弹性机制有助于通过消除恶意或错误事务造成的损害来快速修复数据库,同时保留在入侵/错误和检测之间发生的未受影响的合法事务的影响。这个项目的目标是开发一个可移植的实现框架,它可以增强商业数据库管理系统的入侵弹性,而不需要对其内部进行任何修改。本文描述的入侵弹性机制通过促进(有时甚至是自动化)入侵后损害修复过程,显著提高了现代dbms的可用性。此外,它可以体现在一个可重用的实现框架中,其可移植性通过它在三个不同的dbms (PostgreSQL、Oracle和Sybase)上的成功应用程序来证明。在TPC-C基准测试下对完全可操作原型的性能测量表明,入侵恢复机制的运行时开销在6%到13%之间。
{"title":"A portable implementation framework for intrusion-resilient database management systems","authors":"A. Smirnov, T. Chiueh","doi":"10.1109/DSN.2004.1311914","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311914","url":null,"abstract":"An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or a human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs: PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Characterizing the effects of transient faults on a high-performance processor pipeline 表征暂态故障对高性能处理器流水线的影响
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311877
Nicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel
The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital systems. In this work, the effects of transient faults on high performance microprocessors is explored. To perform a thorough exploration, a highly detailed register transfer level model of a deeply pipelined, out-of-order microprocessor was created. Using fault injection, we determined that fewer than 15% of single bit corruptions in processor state result in software visible errors. These failures were analyzed to identify the most vulnerable portions of the processor, which were then protected using simple low-overhead techniques. This resulted in a 75% reduction in failures. Building upon the failure modes seen in the microarchitecture, fault injections into software were performed to investigate the level of masking that the software layer provides. Together, the baseline microarchitectural substrate and software mask more than 9 out of 10 transient faults from affecting correct program execution.
实现技术进入亚100纳米光刻的进展更新了理解和防止数字系统中单事件干扰的重要性。在这项工作中,探讨了瞬态故障对高性能微处理器的影响。为了进行彻底的探索,创建了一个深度流水线、乱序微处理器的高度详细的寄存器传输级模型。使用故障注入,我们确定处理器状态下的单比特损坏少于15%导致软件可见错误。对这些故障进行分析,以确定处理器中最脆弱的部分,然后使用简单的低开销技术对其进行保护。这使得故障减少了75%。在微架构中看到的故障模式的基础上,对软件进行故障注入,以调查软件层提供的屏蔽级别。总之,基线微架构基板和软件屏蔽了超过9 / 10的影响正确程序执行的瞬时错误。
{"title":"Characterizing the effects of transient faults on a high-performance processor pipeline","authors":"Nicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel","doi":"10.1109/DSN.2004.1311877","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311877","url":null,"abstract":"The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital systems. In this work, the effects of transient faults on high performance microprocessors is explored. To perform a thorough exploration, a highly detailed register transfer level model of a deeply pipelined, out-of-order microprocessor was created. Using fault injection, we determined that fewer than 15% of single bit corruptions in processor state result in software visible errors. These failures were analyzed to identify the most vulnerable portions of the processor, which were then protected using simple low-overhead techniques. This resulted in a 75% reduction in failures. Building upon the failure modes seen in the microarchitecture, fault injections into software were performed to investigate the level of masking that the software layer provides. Together, the baseline microarchitectural substrate and software mask more than 9 out of 10 transient faults from affecting correct program execution.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 418
A defense-centric taxonomy based on attack manifestations 基于攻击表现的以防御为中心的分类法
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311881
Kevin S. Killourhy, R. Maxion, K. Tan
Many classifications of attacks have been tendered, often in taxonomic form, A common basis of these taxonomies is that they have been framed from the perspective of an attacker - they organize attacks with respect to the attacker's goals, such as privilege elevation from user to root (from the well known Lincoln taxonomy). Taxonomies based on attacker goals are attack-centric; those based on defender goals are defense-centric. Defenders need a way of determining whether or not their detectors will detect a given attack. It is suggested that a defense-centric taxonomy would suit this role more effectively than an attack-centric taxonomy. This paper presents a new, defense-centric attack taxonomy, based on the way that attacks manifest as anomalies in monitored sensor data. Unique manifestations, drawn from 25 attacks, were used to organize the taxonomy, which was validated through exposure to an intrusion-detection system, confirming attack detect ability. The taxonomy's predictive utility was compared against that of a well-known extant attack-centric taxonomy. The defense-centric taxonomy is shown to be a more effective predictor of a detector's ability to detect specific attacks, hence informing a defender that a given detector is competent against an entire class of attacks.
已经提出了许多攻击分类,通常以分类法的形式。这些分类法的一个共同基础是从攻击者的角度来构建的——它们根据攻击者的目标来组织攻击,例如将特权从用户提升到root(来自众所周知的Lincoln分类法)。基于攻击者目标的分类法是以攻击为中心的;那些基于防守球员的进球是以防守为中心的。防御者需要一种方法来确定他们的检测器是否会检测到给定的攻击。有人建议,以防御为中心的分类法比以攻击为中心的分类法更适合这个角色。本文提出了一种新的、以防御为中心的攻击分类法,该分类法基于攻击在被监控的传感器数据中表现为异常的方式。从25种攻击中提取独特的表现形式来组织分类,并通过暴露于入侵检测系统进行验证,确认攻击检测能力。将该分类法的预测效用与已知的以攻击为中心的分类法进行了比较。以防御为中心的分类法可以更有效地预测检测器检测特定攻击的能力,从而告知防御者给定的检测器能够抵御整个攻击类别。
{"title":"A defense-centric taxonomy based on attack manifestations","authors":"Kevin S. Killourhy, R. Maxion, K. Tan","doi":"10.1109/DSN.2004.1311881","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311881","url":null,"abstract":"Many classifications of attacks have been tendered, often in taxonomic form, A common basis of these taxonomies is that they have been framed from the perspective of an attacker - they organize attacks with respect to the attacker's goals, such as privilege elevation from user to root (from the well known Lincoln taxonomy). Taxonomies based on attacker goals are attack-centric; those based on defender goals are defense-centric. Defenders need a way of determining whether or not their detectors will detect a given attack. It is suggested that a defense-centric taxonomy would suit this role more effectively than an attack-centric taxonomy. This paper presents a new, defense-centric attack taxonomy, based on the way that attacks manifest as anomalies in monitored sensor data. Unique manifestations, drawn from 25 attacks, were used to organize the taxonomy, which was validated through exposure to an intrusion-detection system, confirming attack detect ability. The taxonomy's predictive utility was compared against that of a well-known extant attack-centric taxonomy. The defense-centric taxonomy is shown to be a more effective predictor of a detector's ability to detect specific attacks, hence informing a defender that a given detector is competent against an entire class of attacks.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115846627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Efficient Byzantine-tolerant erasure-coded storage 高效的拜占庭容忍擦除编码存储
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311884
G. Goodson, J. Wylie, G. Ganger, M. Reiter
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol to efficiently provide linearizability and wait-freedom of read and write operations to erasure-coded data in asynchronous environments with Byzantine failures of clients and servers. By exploiting versioning storage-nodes, the protocol shifts most work to clients and allows highly optimistic operation: reads occur in a single round-trip unless clients observe concurrency or write failures. Measurements of a storage system prototype using this protocol show that it scales well with the number of failures tolerated, and its performance compares favorably with an efficient implementation of Byzantine-tolerant state machine replication.
本文描述了一种用于可生存存储的分散一致性协议,该协议利用每个存储节点内的本地数据版本控制。这种版本控制使协议能够在客户端和服务器出现拜占庭式故障的异步环境中有效地为擦除编码的数据提供读写操作的线性性和等待自由。通过利用存储节点的版本控制,该协议将大部分工作转移给客户端,并允许高度乐观的操作:除非客户端观察到并发性或写失败,否则读取在单次往返中发生。使用该协议对存储系统原型进行的测量表明,它可以很好地扩展可容忍的故障数量,并且其性能优于拜占庭容忍状态机复制的有效实现。
{"title":"Efficient Byzantine-tolerant erasure-coded storage","authors":"G. Goodson, J. Wylie, G. Ganger, M. Reiter","doi":"10.1109/DSN.2004.1311884","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311884","url":null,"abstract":"This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol to efficiently provide linearizability and wait-freedom of read and write operations to erasure-coded data in asynchronous environments with Byzantine failures of clients and servers. By exploiting versioning storage-nodes, the protocol shifts most work to clients and allows highly optimistic operation: reads occur in a single round-trip unless clients observe concurrency or write failures. Measurements of a storage system prototype using this protocol show that it scales well with the number of failures tolerated, and its performance compares favorably with an efficient implementation of Byzantine-tolerant state machine replication.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
Dynamic quarantine of Internet worms 互联网蠕虫的动态隔离
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311878
Cynthia Wong, Chenxi Wang, D. Song, Stan Bielski, G. Ganger
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested in analyzing different deployment strategies of rate control mechanisms and the effect thereof on suppressing the spread of worm code. We use both analytical models and simulation experiments. We find that rate control at individual hosts or edge routers yields a slowdown that is linear in the number of hosts (or routers) with the rate limiting filters. Limiting contact rate at the backbone routers, however, is substantially more effective-it renders a slowdown comparable to deploying rate limiting filters at every individual host that is covered. This result holds true even when susceptible and infected hosts are patched and immunized dynamically. To provide context for our analysis, we examine real traffic traces obtained from a campus computing network. We observe that rate throttling could be enforced with minimal impact on legitimate communications. Two worms observed in the traces, however, would be significantly slowed down.
如果我们限制蠕虫流量的接触率,我们能减轻并最终遏制互联网蠕虫吗?本文试图回答这个问题。具体来说,我们感兴趣的是分析速率控制机制的不同部署策略及其对抑制蠕虫代码传播的影响。我们使用了分析模型和模拟实验。我们发现,在单个主机或边缘路由器上的速率控制产生的减速与速率限制过滤器的主机(或路由器)数量呈线性关系。然而,在骨干路由器上限制接触速率实际上更有效——它带来的减速与在覆盖的每个单独的主机上部署速率限制过滤器相当。即使在易感和受感染的宿主被动态修补和免疫时,这一结果也成立。为了为我们的分析提供背景,我们检查了从校园计算网络获得的真实流量轨迹。我们观察到,费率限制可以在对合法通信影响最小的情况下实施。然而,在痕迹中观察到的两种蠕虫的速度会明显减慢。
{"title":"Dynamic quarantine of Internet worms","authors":"Cynthia Wong, Chenxi Wang, D. Song, Stan Bielski, G. Ganger","doi":"10.1109/DSN.2004.1311878","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311878","url":null,"abstract":"If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested in analyzing different deployment strategies of rate control mechanisms and the effect thereof on suppressing the spread of worm code. We use both analytical models and simulation experiments. We find that rate control at individual hosts or edge routers yields a slowdown that is linear in the number of hosts (or routers) with the rate limiting filters. Limiting contact rate at the backbone routers, however, is substantially more effective-it renders a slowdown comparable to deploying rate limiting filters at every individual host that is covered. This result holds true even when susceptible and infected hosts are patched and immunized dynamically. To provide context for our analysis, we examine real traffic traces obtained from a campus computing network. We observe that rate throttling could be enforced with minimal impact on legitimate communications. Two worms observed in the traces, however, would be significantly slowed down.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Secure distributed DNS 安全分布式DNS
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311912
C. Cachin, A. Samar
A correctly working domain name system (DNS) is essential for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a wide range of attacks. This paper presents the design and implementation of a secure distributed name service on the level of a DNS zone. Our service is able to provide fault tolerance and security even in the presence of a fraction of corrupted name servers, avoiding any single point of failure. It further solves the problem of storing zone secrets online without leaking them to a corrupted server, while still supporting secure dynamic updates. Our service uses state-machine replication and threshold cryptography. We present results from experiments performed using a prototype implementation on the Internet in realistic setups. The results show that our design achieves the required assurances while servicing the most frequent requests in reasonable time.
一个正常工作的域名系统(DNS)对互联网至关重要。由于其重要性和目前设计的不足,DNS容易受到各种攻击。本文提出了一种在DNS区域级别上的安全分布式名称服务的设计与实现。我们的服务能够提供容错性和安全性,即使存在一小部分损坏的名称服务器,避免任何单点故障。它进一步解决了在线存储区域秘密而不将其泄露到损坏的服务器的问题,同时仍然支持安全的动态更新。我们的服务使用状态机复制和阈值加密。我们介绍了在现实设置中使用互联网上的原型实现进行的实验结果。结果表明,我们的设计在合理的时间内满足了最频繁的请求,同时达到了所需的保证。
{"title":"Secure distributed DNS","authors":"C. Cachin, A. Samar","doi":"10.1109/DSN.2004.1311912","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311912","url":null,"abstract":"A correctly working domain name system (DNS) is essential for the Internet. Due to its significance and because of deficiencies in its current design, the DNS is vulnerable to a wide range of attacks. This paper presents the design and implementation of a secure distributed name service on the level of a DNS zone. Our service is able to provide fault tolerance and security even in the presence of a fraction of corrupted name servers, avoiding any single point of failure. It further solves the problem of storing zone secrets online without leaking them to a corrupted server, while still supporting secure dynamic updates. Our service uses state-machine replication and threshold cryptography. We present results from experiments performed using a prototype implementation on the Internet in realistic setups. The results show that our design achieves the required assurances while servicing the most frequent requests in reasonable time.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments 用于ip语音环境的有状态和跨协议入侵检测体系结构
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311913
Yu-Sung Wu, S. Bagchi, S. Garg, Navjot Singh, T. Tsai
Voice-over-IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are being subjected to different kinds of intrusions some of which are specific to such systems and some of which follow a general pattern. VoIP systems pose several new challenges to intrusion detection system (IDS) designers. First, these systems employ multiple protocols for call management (e.g., SIP) and data delivery (e.g., RTP). Second, the systems are distributed in nature and employ distributed clients, servers and proxies. Third, the attacks to such systems span a large class, from denial of service to billing fraud attacks. Finally, the systems are heterogeneous and typically under several different administrative domains. In this paper, we propose the design of an intrusion detection system targeted to VoIP systems, called SCIDIVE (pronounced "Skydive"). SCIDIVE is structured to detect different classes of intrusions, including, masquerading, denial of service, and media stream-based attacks. It can operate with both classes of protocols that compose VoIP systems - call management protocols (CMP), e.g., SIP, and media delivery protocols (MDP), e.g., RTP. SCIDIVE proposes two abstractions for VoIP IDS - stateful detection and cross-protocol detection. Stateful detection denotes assembling state from multiple packets and using the aggregated state in the rule-matching engine. Cross protocol detection denotes matching rules that span multiple protocols. SCIDIVE is demonstrated on a sample VoIP system that comprises SIP clients and SIP proxy servers with RTP as the data delivery protocol. Four attack scenarios are created and the accuracy and the efficiency of the system evaluated with rules meant to catch these attacks.
IP语音(VoIP)系统作为一种通过IP网络传输话音流量的技术,正越来越受欢迎。随着VoIP系统的普及,它们正在遭受不同类型的入侵,其中一些是特定于此类系统的,而另一些则遵循一般模式。VoIP系统对入侵检测系统(IDS)的设计者提出了几个新的挑战。首先,这些系统采用多种协议进行呼叫管理(例如SIP)和数据传递(例如RTP)。其次,系统本质上是分布式的,并使用分布式的客户端、服务器和代理。第三,对此类系统的攻击跨越了很大的类别,从拒绝服务攻击到账单欺诈攻击。最后,系统是异构的,通常在几个不同的管理域下。在本文中,我们提出了一个针对VoIP系统的入侵检测系统,称为SCIDIVE(发音为“Skydive”)。SCIDIVE的结构可以检测不同类型的入侵,包括伪装、拒绝服务和基于媒体流的攻击。它可以与组成VoIP系统的两类协议一起工作——呼叫管理协议(CMP),例如SIP,和媒体交付协议(MDP),例如RTP。SCIDIVE为VoIP IDS提出了两种抽象——状态检测和跨协议检测。有状态检测是指从多个数据包中组装状态,并在规则匹配引擎中使用聚合状态。跨协议检测是指跨越多个协议的匹配规则。SCIDIVE在一个示例VoIP系统上进行了演示,该系统由SIP客户端和SIP代理服务器组成,并以RTP作为数据传递协议。创建了四种攻击场景,并使用旨在捕获这些攻击的规则评估了系统的准确性和效率。
{"title":"SCIDIVE: a stateful and cross protocol intrusion detection architecture for voice-over-IP environments","authors":"Yu-Sung Wu, S. Bagchi, S. Garg, Navjot Singh, T. Tsai","doi":"10.1109/DSN.2004.1311913","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311913","url":null,"abstract":"Voice-over-IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are being subjected to different kinds of intrusions some of which are specific to such systems and some of which follow a general pattern. VoIP systems pose several new challenges to intrusion detection system (IDS) designers. First, these systems employ multiple protocols for call management (e.g., SIP) and data delivery (e.g., RTP). Second, the systems are distributed in nature and employ distributed clients, servers and proxies. Third, the attacks to such systems span a large class, from denial of service to billing fraud attacks. Finally, the systems are heterogeneous and typically under several different administrative domains. In this paper, we propose the design of an intrusion detection system targeted to VoIP systems, called SCIDIVE (pronounced \"Skydive\"). SCIDIVE is structured to detect different classes of intrusions, including, masquerading, denial of service, and media stream-based attacks. It can operate with both classes of protocols that compose VoIP systems - call management protocols (CMP), e.g., SIP, and media delivery protocols (MDP), e.g., RTP. SCIDIVE proposes two abstractions for VoIP IDS - stateful detection and cross-protocol detection. Stateful detection denotes assembling state from multiple packets and using the aggregated state in the rule-matching engine. Cross protocol detection denotes matching rules that span multiple protocols. SCIDIVE is demonstrated on a sample VoIP system that comprises SIP clients and SIP proxy servers with RTP as the data delivery protocol. Four attack scenarios are created and the accuracy and the efficiency of the system evaluated with rules meant to catch these attacks.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"83 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123445537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Efficient hierarchic management for reconfiguration of networked information systems 网络信息系统重构的高效层次管理
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311921
Jonathan C. Rowanhill, Philip E. Varner, J. Knight
The management of modern distributed systems is complicated by scale and dynamics. Scalable, decoupled communication establishes flexible, loosely coupled component relationships, and these relationships help meet the present demands on management. However, traditional decoupled addressing mechanisms tend to focus the addressing on only one of the parties involved in communication while, in general, a communication relationship involves a sender, communicated content, and receivers. The state of all three are simultaneously relevant to correctness of a management relationship and its communications. We introduce selective notification, a scalable, decoupled event dissemination architecture supporting simultaneous and combined addressing of senders, receivers, and events. We demonstrate its application to programming dynamic, scalable management relationships. We then discuss its implementation, and present measurements of its effective capabilities.
现代分布式系统的管理因规模和动态性而变得复杂。可伸缩的、解耦的通信建立了灵活的、松散耦合的组件关系,这些关系有助于满足当前对管理的需求。然而,传统的解耦寻址机制倾向于只关注通信中涉及的一方,而通常,通信关系涉及发送方、通信内容和接收方。这三种状态同时与管理关系及其沟通的正确性相关。我们介绍了选择性通知,这是一种可扩展的、解耦的事件传播架构,支持发送方、接收方和事件的同时和组合寻址。我们演示了它在规划动态的、可扩展的管理关系方面的应用。然后我们讨论它的实现,并提出其有效能力的度量。
{"title":"Efficient hierarchic management for reconfiguration of networked information systems","authors":"Jonathan C. Rowanhill, Philip E. Varner, J. Knight","doi":"10.1109/DSN.2004.1311921","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311921","url":null,"abstract":"The management of modern distributed systems is complicated by scale and dynamics. Scalable, decoupled communication establishes flexible, loosely coupled component relationships, and these relationships help meet the present demands on management. However, traditional decoupled addressing mechanisms tend to focus the addressing on only one of the parties involved in communication while, in general, a communication relationship involves a sender, communicated content, and receivers. The state of all three are simultaneously relevant to correctness of a management relationship and its communications. We introduce selective notification, a scalable, decoupled event dissemination architecture supporting simultaneous and combined addressing of senders, receivers, and events. We demonstrate its application to programming dynamic, scalable management relationships. We then discuss its implementation, and present measurements of its effective capabilities.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
International Conference on Dependable Systems and Networks, 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1