Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06)
DOI: 10.1109/isorc.2006.7
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Intrusion-Tolerant Overlay Network

Abstract: The Internet routing layer is at times too slow at recovering from faults and makes a sub-optimal use of redundancy available at the IP layer. Overlay networks can overcome these deficiencies to provide communication infrastructures with greater availability and flexibility. The majority of current experiences, however, are able to tolerate only simple (crash) failures of the underlying network. In this paper we present LITON, an overlay network architecture that aims at providing highly available communicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…We assume fault independence for servers, i.e., the probability of a server being faulty is independent of another server being faulty. This assumption can be substantiated in practice through the use of diversity (Obelheiro et al, 2006). WSDS works correctly while a bound of up f n ≤ (n+1)/3 DepSpace servers (the optimal resilience for this type of replication (Castro & Liskov 2002)), f g ≤ g -1 gateways (at least one correct) and an arbitrary number of client fails.…”
Section: System Modelmentioning
confidence: 91%
“…We assume fault independence for servers, i.e., the probability of a server being faulty is independent of another server being faulty. This assumption can be substantiated in practice through the use of diversity (Obelheiro et al, 2006). WSDS works correctly while a bound of up f n ≤ (n+1)/3 DepSpace servers (the optimal resilience for this type of replication (Castro & Liskov 2002)), f g ≤ g -1 gateways (at least one correct) and an arbitrary number of client fails.…”
Section: System Modelmentioning
confidence: 91%
“…When deliberate attacks are considered, as in intrusion tolerance, this measure becomes even more relevant. Interestingly, location diversity can be easily joined with diverse administration domains characterizing the different sites, so further improving the defense against attackers (Obelheiro et al, 2006). In the following it is assumed that the defender has s sites at disposal and can distribute the variants among the sites.…”
Section: 21mentioning
confidence: 99%