Cheap Intrusion-Tolerant Protection for CRUTIAL Things
Main Author: | |
---|---|
Publication Date: | 2009 |
Other Authors: | , , , |
Format: | Report |
Language: | eng |
Source: | Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
Download full: | http://hdl.handle.net/10451/14227 |
Summary: | Reviewed by Marcelo Pasin |
id |
RCAP_c38da2618b157193f6adb63a55a066b1 |
---|---|
oai_identifier_str |
oai:repositorio.ulisboa.pt:10455/3166 |
network_acronym_str |
RCAP |
network_name_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository_id_str |
https://opendoar.ac.uk/repository/7160 |
spelling |
Cheap Intrusion-Tolerant Protection for CRUTIAL ThingsFirewallsSecurityCritical InfrastructuresByzantine Fault ToleranceIntrusion ToleranceReviewed by Marcelo PasinToday’s critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other interconnected computer system, but their failure has a high socio-economic impact. The report describes a new construct for the protection of these infrastructures, based on distributed algorithms and mechanisms implemented between a set of devices called CIS. CIS collectively ensure that incoming/outgoing traffic satisfies the security policy of an organization facing accidents and attacks. However, they are not simple firewalls but distributed protection devices based on a sophisticated access control model and designed with intrusion-tolerant capabilities. The report discusses the rationale behind the use of CIS to improve the resilience of critical infrastructures, and it describes and evaluates two CIS implementations, one using physical replicas, and another using virtual machine (VM) based replicas. Our intrusion-tolerant solution is cheap in four different ways: it uses less replicas than other intrusion-tolerant services; it does not requires expensive consensus protocols; the performance overhead is minimal; and it can be deployed in a single physical machine through the use of VM technology.Repositório da Universidade de LisboaCorreia, MiguelBessani, AlyssonNeves, NunoVerissimo, PauloSousa, Paulo2009-09-10T15:54:08Z2009-09-10T15:54:08Z2009-09-10info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14227enginfo:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2025-03-17T13:12:54Zoai:repositorio.ulisboa.pt:10455/3166Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-29T02:37:37.527850Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse |
dc.title.none.fl_str_mv |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
spellingShingle |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things Correia, Miguel Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
title_short |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_full |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_fullStr |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_full_unstemmed |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
title_sort |
Cheap Intrusion-Tolerant Protection for CRUTIAL Things |
author |
Correia, Miguel |
author_facet |
Correia, Miguel Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
author_role |
author |
author2 |
Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
author2_role |
author author author author |
dc.contributor.none.fl_str_mv |
Repositório da Universidade de Lisboa |
dc.contributor.author.fl_str_mv |
Correia, Miguel Bessani, Alysson Neves, Nuno Verissimo, Paulo Sousa, Paulo |
dc.subject.por.fl_str_mv |
Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
topic |
Firewalls Security Critical Infrastructures Byzantine Fault Tolerance Intrusion Tolerance |
description |
Reviewed by Marcelo Pasin |
publishDate |
2009 |
dc.date.none.fl_str_mv |
2009-09-10T15:54:08Z 2009-09-10T15:54:08Z 2009-09-10 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/report |
format |
report |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10451/14227 |
url |
http://hdl.handle.net/10451/14227 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia instacron:RCAAP |
instname_str |
FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
collection |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository.name.fl_str_mv |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
repository.mail.fl_str_mv |
info@rcaap.pt |
_version_ |
1833601432242094080 |