首页 > 最新文献

International Conference on Dependable Systems and Networks, 2004最新文献

英文 中文
High throughput Byzantine fault tolerance 高吞吐量拜占庭容错
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311928
R. Kotla, M. Dahlin
This paper argues for a simple change to Byzantine fault tolerant (BFT) state machine replication libraries. Traditional BFT state machine replication techniques provide high availability and security but fail to provide high throughput. This limitation stems from the fundamental assumption of generalized state machine replication techniques that all replicas execute requests sequentially in the same total order to ensure consistency across replicas. We propose a high throughput Byzantine fault tolerant architecture that uses application-specific information to identify and concurrently execute independent requests. Our architecture thus provides a general way to exploit application parallelism in order to provide high throughput without compromising correctness. Although this approach is extremely simple, it yields dramatic practical benefits. When sufficient application concurrency and hardware resources exist, CBASE, our system prototype, provides orders of magnitude improvements in throughput over BASE, a traditional BFT architecture. CBASE-FS, a Byzantine fault tolerant file system that uses CBASE, achieves twice the throughput of BASE-FS for the IOZone micro-benchmarks even in a configuration with modest available hardware parallelism.
本文主张对拜占庭容错(BFT)状态机复制库进行简单更改。传统的BFT状态机复制技术提供了高可用性和安全性,但无法提供高吞吐量。这种限制源于广义状态机复制技术的基本假设,即所有副本以相同的总顺序依次执行请求,以确保副本之间的一致性。我们提出了一个高吞吐量拜占庭容错架构,它使用特定于应用程序的信息来识别和并发执行独立的请求。因此,我们的体系结构提供了一种利用应用程序并行性的通用方法,以便在不影响正确性的情况下提供高吞吐量。尽管这种方法非常简单,但它产生了巨大的实际好处。当存在足够的应用程序并发性和硬件资源时,CBASE(我们的系统原型)比BASE(传统的BFT架构)提供了数量级的吞吐量改进。CBASE- fs是一个拜占庭式的容错文件系统,它使用CBASE,在IOZone微基准测试中实现的吞吐量是BASE-FS的两倍,即使在可用硬件并行性适中的配置下也是如此。
{"title":"High throughput Byzantine fault tolerance","authors":"R. Kotla, M. Dahlin","doi":"10.1109/DSN.2004.1311928","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311928","url":null,"abstract":"This paper argues for a simple change to Byzantine fault tolerant (BFT) state machine replication libraries. Traditional BFT state machine replication techniques provide high availability and security but fail to provide high throughput. This limitation stems from the fundamental assumption of generalized state machine replication techniques that all replicas execute requests sequentially in the same total order to ensure consistency across replicas. We propose a high throughput Byzantine fault tolerant architecture that uses application-specific information to identify and concurrently execute independent requests. Our architecture thus provides a general way to exploit application parallelism in order to provide high throughput without compromising correctness. Although this approach is extremely simple, it yields dramatic practical benefits. When sufficient application concurrency and hardware resources exist, CBASE, our system prototype, provides orders of magnitude improvements in throughput over BASE, a traditional BFT architecture. CBASE-FS, a Byzantine fault tolerant file system that uses CBASE, achieves twice the throughput of BASE-FS for the IOZone micro-benchmarks even in a configuration with modest available hardware parallelism.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124629431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 175
Component middleware to support non-repudiable service interactions 组件中间件支持不可抵赖的服务交互
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311931
N. Cook, P. Robinson, S. Shrivastava
The wide variety of services and resources available over the Internet presents new opportunities to create value added, inter-organisational composite services (CSs)from multiple existing services. To preserve their autonomy and privacy, each organisation needs to regulate access both to their services and to shared information within the CS. Key mechanisms to facilitate such regulated interactions are the collection and verification of non-repudiable evidence of the actions of the parties to the CS. The paper describes how component-based middleware can be enhanced to support non-repudiable service invocation and information sharing. A generic implementation, based on a J2EE application server, is presented.
互联网上提供的服务和资源种类繁多,为从现有的多种服务中创造增值的跨机构组合服务提供了新的机会。为了保护他们的自主权和隐私,每个机构都需要规范访问他们的服务和在CS内共享信息的方式。促进这种受管制的相互作用的关键机制是收集和核查关于安全公约各方行动的不可否认的证据。本文描述了如何增强基于组件的中间件以支持不可抵赖的服务调用和信息共享。给出了一个基于J2EE应用服务器的通用实现。
{"title":"Component middleware to support non-repudiable service interactions","authors":"N. Cook, P. Robinson, S. Shrivastava","doi":"10.1109/DSN.2004.1311931","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311931","url":null,"abstract":"The wide variety of services and resources available over the Internet presents new opportunities to create value added, inter-organisational composite services (CSs)from multiple existing services. To preserve their autonomy and privacy, each organisation needs to regulate access both to their services and to shared information within the CS. Key mechanisms to facilitate such regulated interactions are the collection and verification of non-repudiable evidence of the actions of the parties to the CS. The paper describes how component-based middleware can be enhanced to support non-repudiable service invocation and information sharing. A generic implementation, based on a J2EE application server, is presented.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129744089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A practical analysis of low-density parity-check erasure codes for wide-area storage applications 用于广域存储的低密度奇偶校验擦除码的实际分析
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311882
J. Plank, M. Thomason
As peer-to-peer and widely distributed storage systems proliferate, the need to perform efficient erasure coding, instead of replication, is crucial to performance and efficiency. Low-density parity-check (LDPC) codes have arisen as alternatives to standard erasure codes, such as Reed-Solomon codes, trading off vastly improved decoding performance for inefficiencies in the amount of data that must be acquired to perform decoding. The scores of papers written on LDPC codes typically analyze their collective and asymptotic behavior. Unfortunately, their practical application requires the generation and analysis of individual codes for finite systems. This paper attempts to illuminate the practical considerations of LDPC codes for peer-to-peer and distributed storage systems. The three main types of LDPC codes are detailed, and a huge variety of codes are generated, then analyzed using simulation. This analysis focuses on the performance of individual codes for finite systems, and addresses several important heretofore unanswered questions about employing LDPC codes in real-world systems.
随着点对点和广泛分布的存储系统的激增,需要执行高效的擦除编码,而不是复制,这对性能和效率至关重要。低密度奇偶校验码(LDPC)已经成为标准擦除码(如Reed-Solomon码)的替代方案,它极大地提高了解码性能,但却降低了解码所需数据量的效率。关于LDPC码的论文通常分析它们的集体行为和渐近行为。不幸的是,它们的实际应用需要为有限系统生成和分析单个代码。本文试图阐明LDPC码在点对点和分布式存储系统中的实际考虑。详细介绍了三种主要的LDPC码,生成了种类繁多的LDPC码,并进行了仿真分析。本分析侧重于有限系统中单个代码的性能,并解决了在实际系统中使用LDPC代码的几个重要的迄今未回答的问题。
{"title":"A practical analysis of low-density parity-check erasure codes for wide-area storage applications","authors":"J. Plank, M. Thomason","doi":"10.1109/DSN.2004.1311882","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311882","url":null,"abstract":"As peer-to-peer and widely distributed storage systems proliferate, the need to perform efficient erasure coding, instead of replication, is crucial to performance and efficiency. Low-density parity-check (LDPC) codes have arisen as alternatives to standard erasure codes, such as Reed-Solomon codes, trading off vastly improved decoding performance for inefficiencies in the amount of data that must be acquired to perform decoding. The scores of papers written on LDPC codes typically analyze their collective and asymptotic behavior. Unfortunately, their practical application requires the generation and analysis of individual codes for finite systems. This paper attempts to illuminate the practical considerations of LDPC codes for peer-to-peer and distributed storage systems. The three main types of LDPC codes are detailed, and a huge variety of codes are generated, then analyzed using simulation. This analysis focuses on the performance of individual codes for finite systems, and addresses several important heretofore unanswered questions about employing LDPC codes in real-world systems.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128741264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
Generic faultloads based on software faults for dependability benchmarking 基于软件故障的通用故障负载可靠性基准测试
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311898
J. Durães, H. Madeira
The most critical component of a dependability benchmark is the faultload, as it should represent a repeatable, portable, representative, and generally accepted set of faults. These properties are essential to achieve the desired standardization level required by a dependability benchmark but, unfortunately, are very hard to achieve. This is particularly true for software faults, which surely accounts for the fact that this important class of faults has never been used in known dependability benchmark proposals. This paper proposes a new methodology for the definition of faultloads based on software faults for dependability benchmarking. Faultload properties such as repeatability, portability and scalability are also analyzed and validated through experimentation using a case study of dependability benchmarking of Web-servers. We concluded that software fault-based faultloads generated using our methodology are appropriate and useful for dependability benchmarking. As our methodology is not tied to any specific software vendor or platform, it can be used to generate faultloads for the evaluation of any software product such as OLTP systems.
可靠性基准的最关键组件是故障负载,因为它应该表示可重复的、可移植的、有代表性的和普遍接受的故障集。这些属性对于实现可靠性基准所要求的所需标准化级别是必不可少的,但不幸的是,它们很难实现。对于软件错误来说尤其如此,这肯定解释了这类重要的错误从未在已知的可靠性基准建议中使用的事实。提出了一种基于软件故障的故障负荷定义方法,用于可靠性基准测试。通过使用web服务器可靠性基准测试的案例研究,还分析和验证了诸如可重复性、可移植性和可伸缩性等故障负载属性。我们的结论是,使用我们的方法生成的基于软件故障的故障负载对于可靠性基准测试是合适和有用的。由于我们的方法不依赖于任何特定的软件供应商或平台,因此它可用于生成用于评估任何软件产品(如OLTP系统)的故障负载。
{"title":"Generic faultloads based on software faults for dependability benchmarking","authors":"J. Durães, H. Madeira","doi":"10.1109/DSN.2004.1311898","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311898","url":null,"abstract":"The most critical component of a dependability benchmark is the faultload, as it should represent a repeatable, portable, representative, and generally accepted set of faults. These properties are essential to achieve the desired standardization level required by a dependability benchmark but, unfortunately, are very hard to achieve. This is particularly true for software faults, which surely accounts for the fact that this important class of faults has never been used in known dependability benchmark proposals. This paper proposes a new methodology for the definition of faultloads based on software faults for dependability benchmarking. Faultload properties such as repeatability, portability and scalability are also analyzed and validated through experimentation using a case study of dependability benchmarking of Web-servers. We concluded that software fault-based faultloads generated using our methodology are appropriate and useful for dependability benchmarking. As our methodology is not tied to any specific software vendor or platform, it can be used to generate faultloads for the evaluation of any software product such as OLTP systems.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
The join problem in dynamic network algorithms 动态网络算法中的联接问题
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311901
K. Konwar, D. Kowalski, Alexander A. Shvartsman
Distributed algorithms in dynamic networks often employ communication patterns whose purpose is to disseminate information among the participants. Gossiping is one form of such communication pattern. In dynamic settings, the set of participants can change substantially as new participants join, and as failures and voluntary departures remove those who have joined previously. A natural question for such settings is: how soon can newly joined nodes discover each other by means of gossiping? This paper abstracts and studies the join problem for dynamic systems that use all-to-all gossip. The problem is studied in terms of join-connectivity graphs where vertices represent the participants and where each edge represents one participant's knowledge about another. Ideally, such a graph has diameter one, i.e., all participants know each other. The diameter can grow as new participants join, and as failures remove edges from the graph. Gossip helps participants discover one another, decreasing the diameter. The results describe the lower and upper bounds on the number of communication rounds such that the participants who have previously joined discover one another, under a variety of assumptions about the joining and failures. For example, in the case when new participants join at multiple participants and participants may crash, the number of rounds cannot be bounded. In the more benign cases when the failures can be controlled or when new participants join at only one participant, the bound on rounds is shown to be logarithmic in the diameter of the initial configuration.
动态网络中的分布式算法通常采用通信模式,其目的是在参与者之间传播信息。八卦就是这种交流模式的一种形式。在动态环境中,随着新参与者的加入,以及先前加入的参与者的失败和自愿离开,参与者的集合可能发生重大变化。对于这样的设置,一个自然的问题是:通过八卦的方式,新加入的节点能多快发现彼此?摘要研究了全对全八卦动态系统的连接问题。这个问题是通过连接图来研究的,其中顶点代表参与者,每条边代表一个参与者对另一个参与者的知识。理想情况下,这样的图的直径为1,即所有参与者都彼此认识。随着新参与者的加入,以及失败从图中移除边缘,直径会变大。八卦可以帮助参与者发现彼此,减小直径。结果描述了通信轮数的下界和上界,以便先前加入的参与者在各种关于加入和失败的假设下发现彼此。例如,在新参与者加入多个参与者并且参与者可能崩溃的情况下,轮数不能被限制。在较为温和的情况下,故障可以得到控制,或者当新参与者加入时只有一个参与者时,轮的界在初始配置的直径中显示为对数。
{"title":"The join problem in dynamic network algorithms","authors":"K. Konwar, D. Kowalski, Alexander A. Shvartsman","doi":"10.1109/DSN.2004.1311901","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311901","url":null,"abstract":"Distributed algorithms in dynamic networks often employ communication patterns whose purpose is to disseminate information among the participants. Gossiping is one form of such communication pattern. In dynamic settings, the set of participants can change substantially as new participants join, and as failures and voluntary departures remove those who have joined previously. A natural question for such settings is: how soon can newly joined nodes discover each other by means of gossiping? This paper abstracts and studies the join problem for dynamic systems that use all-to-all gossip. The problem is studied in terms of join-connectivity graphs where vertices represent the participants and where each edge represents one participant's knowledge about another. Ideally, such a graph has diameter one, i.e., all participants know each other. The diameter can grow as new participants join, and as failures remove edges from the graph. Gossip helps participants discover one another, decreasing the diameter. The results describe the lower and upper bounds on the number of communication rounds such that the participants who have previously joined discover one another, under a variety of assumptions about the joining and failures. For example, in the case when new participants join at multiple participants and participants may crash, the number of rounds cannot be bounded. In the more benign cases when the failures can be controlled or when new participants join at only one participant, the bound on rounds is shown to be logarithmic in the diameter of the initial configuration.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard 对实现高级加密标准的智能卡提供针对故障注入攻击的强大保护
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311880
M. Karpovsky, Konrad J. Kulikowski, A. Taubin
We present a method of protecting a hardware implementation of the advanced encryption standard (AES) against a side-channel attack known as differential fault analysis attack. The method uses systematic nonlinear (cubic) robust error detecting codes. Error-detecting capabilities of these codes depend not just on error patterns (as in the case of linear codes) but also on data at the output of the device which is protected by the code and this data is unknown to the attacker since it depends on the secret key. In addition to this, the proposed nonlinear (n,k)-codes reduce the fraction of undetectable errors from 2/sup -r/ to 2/sup -2r/ as compared to the corresponding (n,k) linear code (where n - k = r and k >= r). We also present results on a FPGA implementation of the proposed protection scheme for AES as well as simulation results on efficiency of the robust codes.
我们提出了一种保护高级加密标准(AES)的硬件实现免受称为差分故障分析攻击的侧信道攻击的方法。该方法采用系统非线性(三次)鲁棒错误检测码。这些代码的错误检测能力不仅取决于错误模式(如线性代码的情况),还取决于设备输出的数据,这些数据受代码保护,攻击者不知道这些数据,因为它依赖于密钥。除此之外,与相应的(n,k)线性码(其中n - k = r和k >= r)相比,所提出的非线性(n,k)码减少了从2/sup -r/到2/sup -2r/的不可检测错误的比例。我们还介绍了所提出的AES保护方案的FPGA实现结果以及鲁棒码效率的仿真结果。
{"title":"Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard","authors":"M. Karpovsky, Konrad J. Kulikowski, A. Taubin","doi":"10.1109/DSN.2004.1311880","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311880","url":null,"abstract":"We present a method of protecting a hardware implementation of the advanced encryption standard (AES) against a side-channel attack known as differential fault analysis attack. The method uses systematic nonlinear (cubic) robust error detecting codes. Error-detecting capabilities of these codes depend not just on error patterns (as in the case of linear codes) but also on data at the output of the device which is protected by the code and this data is unknown to the attacker since it depends on the secret key. In addition to this, the proposed nonlinear (n,k)-codes reduce the fraction of undetectable errors from 2/sup -r/ to 2/sup -2r/ as compared to the corresponding (n,k) linear code (where n - k = r and k >= r). We also present results on a FPGA implementation of the proposed protection scheme for AES as well as simulation results on efficiency of the robust codes.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
Quantifying the reliability of proven SPIDER group membership service guarantees 量化已验证的SPIDER组成员服务保证的可靠性
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311897
Elizabeth Latronico, P. Miner, P. Koopman
For safety-critical systems, it is essential to quantify the reliability of the assumptions that underlie proven guarantees. We investigate the reliability of the assumptions of the SPIDER group membership service with respect to transient and permanent faults. Modeling 12,600 possible system configurations, the probability that SPIDER's maximum fault assumption does not hold for an hour mission varies from less likely than l0/sup -11/ to more likely than 10/sup -3/. In most cases examined, a transient fault tolerance strategy was superior to the permanent fault tolerance strategy previously in use for the range of transient fault arrival rates expected in aerospace systems. Reliability of the maximum fault assumption (upon which the proofs are based) differs greatly when subjected to asymmetric, symmetric, and benign faults. This case study demonstrates the benefits of quantifying the reliability of assumptions for proven properties.
对于安全关键型系统,有必要量化作为已证明保证基础的假设的可靠性。我们研究了蜘蛛组成员服务在瞬态和永久故障方面假设的可靠性。通过建模12,600种可能的系统配置,SPIDER的最大故障假设在一小时任务中不成立的概率从小于10/sup -11/到大于10/sup -3/不等。在大多数情况下,暂态容错策略优于先前在航空航天系统中使用的暂态故障到达率范围内的永久容错策略。当遭受不对称、对称和良性故障时,最大故障假设(证明的基础)的可靠性差别很大。这个案例研究证明了量化已证实属性假设的可靠性的好处。
{"title":"Quantifying the reliability of proven SPIDER group membership service guarantees","authors":"Elizabeth Latronico, P. Miner, P. Koopman","doi":"10.1109/DSN.2004.1311897","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311897","url":null,"abstract":"For safety-critical systems, it is essential to quantify the reliability of the assumptions that underlie proven guarantees. We investigate the reliability of the assumptions of the SPIDER group membership service with respect to transient and permanent faults. Modeling 12,600 possible system configurations, the probability that SPIDER's maximum fault assumption does not hold for an hour mission varies from less likely than l0/sup -11/ to more likely than 10/sup -3/. In most cases examined, a transient fault tolerance strategy was superior to the permanent fault tolerance strategy previously in use for the range of transient fault arrival rates expected in aerospace systems. Reliability of the maximum fault assumption (upon which the proofs are based) differs greatly when subjected to asymmetric, symmetric, and benign faults. This case study demonstrates the benefits of quantifying the reliability of assumptions for proven properties.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
HOURS: achieving DoS resilience in an open service hierarchy 小时:在开放的服务层次结构中实现DoS弹性
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311879
Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang
Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This paper presents HOURS that achieves DoS resilience in an open service hierarchy. HOURS ensures high degree of service accessibility for each surviving node by: 1) augmenting the service hierarchy with hierarchical overlay networks with rich connectivity; 2) making the connectivity of each overlay highly unpredictable; and 3) recovering the overlay when its normal operations are disrupted. We analyze an HOURS-protected open service hierarchy, and demonstrate its high degree of resilience to even large-scale, topology-aware DoS attacks.
在Internet中,分层系统被广泛用于提供可伸缩的分布式服务。不幸的是,这样的服务层次结构很容易受到DoS攻击。本文介绍了在开放服务层次结构中实现DoS弹性的HOURS。HOURS通过以下方式确保每个幸存节点的高服务可达性:1)利用具有丰富连通性的分层覆盖网络增强服务层次;2)使每个覆盖层的连通性高度不可预测;3)在覆盖层正常运行中断时恢复覆盖层。我们分析了一个受hours保护的开放服务层次结构,并展示了它对大规模、拓扑感知的DoS攻击的高度弹性。
{"title":"HOURS: achieving DoS resilience in an open service hierarchy","authors":"Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang","doi":"10.1109/DSN.2004.1311879","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311879","url":null,"abstract":"Hierarchical systems have been widely used to provide scalable distributed services in the Internet. Unfortunately, such a service hierarchy is vulnerable to DoS attacks. This paper presents HOURS that achieves DoS resilience in an open service hierarchy. HOURS ensures high degree of service accessibility for each surviving node by: 1) augmenting the service hierarchy with hierarchical overlay networks with rich connectivity; 2) making the connectivity of each overlay highly unpredictable; and 3) recovering the overlay when its normal operations are disrupted. We analyze an HOURS-protected open service hierarchy, and demonstrate its high degree of resilience to even large-scale, topology-aware DoS attacks.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Model checking action- and state-labelled Markov chains 模型检查动作和状态标记的马尔可夫链
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311941
C. Baier, L. Cloth, B. Haverkort, M. Kuntz, M. Siegle
In this paper we introduce the logic asCSL, an extension of continuous stochastic logic (CSL), which provides powerful means to characterise execution paths of action- and state-labelled Markov chains. In asCSL, path properties are characterised by regular expressions over actions and state-formulas. Thus, the executability of a path not only depends on the available actions but also on the validity of certain state formulas in intermediate states. Our main result is that the model checking problem for asCSL can be reduced to CSL model checking on a modified Markov chain, which is obtained through a product automaton construction. We provide a case study of a scalable cellular phone system which shows how the logic asCSL and the model checking procedure can be applied in practice.
本文引入了连续随机逻辑(CSL)的扩展——连续随机逻辑(asCSL),它为描述动作标记和状态标记的马尔可夫链的执行路径提供了有力的手段。在asCSL中,路径属性由动作和状态公式之上的正则表达式表示。因此,路径的可执行性不仅取决于可用的操作,还取决于中间状态下某些状态公式的有效性。我们的主要研究结果是,asCSL的模型检验问题可以简化为CSL模型在一个修改的马尔可夫链上的检验,该马尔可夫链是通过一个产品自动机构造得到的。我们提供了一个可扩展的蜂窝电话系统的案例研究,展示了逻辑asCSL和模型检查程序如何在实践中应用。
{"title":"Model checking action- and state-labelled Markov chains","authors":"C. Baier, L. Cloth, B. Haverkort, M. Kuntz, M. Siegle","doi":"10.1109/DSN.2004.1311941","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311941","url":null,"abstract":"In this paper we introduce the logic asCSL, an extension of continuous stochastic logic (CSL), which provides powerful means to characterise execution paths of action- and state-labelled Markov chains. In asCSL, path properties are characterised by regular expressions over actions and state-formulas. Thus, the executability of a path not only depends on the available actions but also on the validity of certain state formulas in intermediate states. Our main result is that the model checking problem for asCSL can be reduced to CSL model checking on a modified Markov chain, which is obtained through a product automaton construction. We provide a case study of a scalable cellular phone system which shows how the logic asCSL and the model checking procedure can be applied in practice.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125286269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Model checking dependability attributes of wireless group communication 无线群通信可靠性属性的模型检验
Pub Date : 2004-06-28 DOI: 10.1109/DSN.2004.1311942
M. Massink, J. Katoen, D. Latella
Models used for the analysis of dependability and performance attributes of communication protocols often abstract considerably from the details of the actual protocol. These models often consist of concurrent sub-models and this may make it hard to judge whether their behaviour is faithfully reflecting the protocol. In this paper, we show how model checking of continuous-time Markov chains, generated from high-level specifications, facilitates the analysis of both correctness and dependability attributes. We illustrate this by revisiting a dependability analysis as stated in A. Coccoli et al. (2001)of a variant of the central access protocol of the IEEE 802.11 standard for wireless local area networks. This variant has been developed to support real-time group communication between autonomous mobile stations. Correctness and dependability properties are formally characterised using continuous stochastic logic and are automatically verified by the ETMCC model checker. The models used are specified as stochastic activity nets.
用于分析通信协议的可靠性和性能属性的模型通常从实际协议的细节中抽象出来。这些模型通常由并发子模型组成,这可能使得很难判断它们的行为是否忠实地反映了协议。在本文中,我们展示了由高级规范生成的连续时间马尔可夫链的模型检查如何促进对正确性和可靠性属性的分析。我们通过回顾a . Coccoli等人(2001)对IEEE 802.11无线局域网标准中心接入协议的一种变体所作的可靠性分析来说明这一点。这种变体已被开发用于支持自主移动站之间的实时组通信。正确性和可靠性特性使用连续随机逻辑正式表征,并由ETMCC模型检查器自动验证。所使用的模型被指定为随机活动网。
{"title":"Model checking dependability attributes of wireless group communication","authors":"M. Massink, J. Katoen, D. Latella","doi":"10.1109/DSN.2004.1311942","DOIUrl":"https://doi.org/10.1109/DSN.2004.1311942","url":null,"abstract":"Models used for the analysis of dependability and performance attributes of communication protocols often abstract considerably from the details of the actual protocol. These models often consist of concurrent sub-models and this may make it hard to judge whether their behaviour is faithfully reflecting the protocol. In this paper, we show how model checking of continuous-time Markov chains, generated from high-level specifications, facilitates the analysis of both correctness and dependability attributes. We illustrate this by revisiting a dependability analysis as stated in A. Coccoli et al. (2001)of a variant of the central access protocol of the IEEE 802.11 standard for wireless local area networks. This variant has been developed to support real-time group communication between autonomous mobile stations. Correctness and dependability properties are formally characterised using continuous stochastic logic and are automatically verified by the ETMCC model checker. The models used are specified as stochastic activity nets.","PeriodicalId":436323,"journal":{"name":"International Conference on Dependable Systems and Networks, 2004","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
International Conference on Dependable Systems and Networks, 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1