Cheap Intrusion-Tolerant Protection for CRUTIAL Things

Bibliographic Details
Main Author: Correia, Miguel
Publication Date: 2009
Other Authors: Bessani, Alysson, Neves, Nuno, Verissimo, Paulo, Sousa, Paulo
Format: Report
Language: eng
Source: Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
Download full: http://hdl.handle.net/10451/14227
Summary: Reviewed by Marcelo Pasin
id RCAP_c38da2618b157193f6adb63a55a066b1
oai_identifier_str oai:repositorio.ulisboa.pt:10455/3166
network_acronym_str RCAP
network_name_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository_id_str https://opendoar.ac.uk/repository/7160
spelling Cheap Intrusion-Tolerant Protection for CRUTIAL ThingsFirewallsSecurityCritical InfrastructuresByzantine Fault ToleranceIntrusion ToleranceReviewed by Marcelo PasinToday’s critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other interconnected computer system, but their failure has a high socio-economic impact. The report describes a new construct for the protection of these infrastructures, based on distributed algorithms and mechanisms implemented between a set of devices called CIS. CIS collectively ensure that incoming/outgoing traffic satisfies the security policy of an organization facing accidents and attacks. However, they are not simple firewalls but distributed protection devices based on a sophisticated access control model and designed with intrusion-tolerant capabilities. The report discusses the rationale behind the use of CIS to improve the resilience of critical infrastructures, and it describes and evaluates two CIS implementations, one using physical replicas, and another using virtual machine (VM) based replicas. Our intrusion-tolerant solution is cheap in four different ways: it uses less replicas than other intrusion-tolerant services; it does not requires expensive consensus protocols; the performance overhead is minimal; and it can be deployed in a single physical machine through the use of VM technology.Repositório da Universidade de LisboaCorreia, MiguelBessani, AlyssonNeves, NunoVerissimo, PauloSousa, Paulo2009-09-10T15:54:08Z2009-09-10T15:54:08Z2009-09-10info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14227enginfo:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2025-03-17T13:12:54Zoai:repositorio.ulisboa.pt:10455/3166Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-29T02:37:37.527850Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse
dc.title.none.fl_str_mv Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title Cheap Intrusion-Tolerant Protection for CRUTIAL Things
spellingShingle Cheap Intrusion-Tolerant Protection for CRUTIAL Things
Correia, Miguel
Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
title_short Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_full Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_fullStr Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_full_unstemmed Cheap Intrusion-Tolerant Protection for CRUTIAL Things
title_sort Cheap Intrusion-Tolerant Protection for CRUTIAL Things
author Correia, Miguel
author_facet Correia, Miguel
Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
author_role author
author2 Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
author2_role author
author
author
author
dc.contributor.none.fl_str_mv Repositório da Universidade de Lisboa
dc.contributor.author.fl_str_mv Correia, Miguel
Bessani, Alysson
Neves, Nuno
Verissimo, Paulo
Sousa, Paulo
dc.subject.por.fl_str_mv Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
topic Firewalls
Security
Critical Infrastructures
Byzantine Fault Tolerance
Intrusion Tolerance
description Reviewed by Marcelo Pasin
publishDate 2009
dc.date.none.fl_str_mv 2009-09-10T15:54:08Z
2009-09-10T15:54:08Z
2009-09-10
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/report
format report
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10451/14227
url http://hdl.handle.net/10451/14227
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron:RCAAP
instname_str FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron_str RCAAP
institution RCAAP
reponame_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
collection Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository.name.fl_str_mv Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
repository.mail.fl_str_mv info@rcaap.pt
_version_ 1833601432242094080