2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) 2016
DOI: 10.1109/icdcs.2016.99
|View full text |Cite
|
Sign up to set email alerts
|

Practical Intrusion-Tolerant Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Later works tried to further optimize this algorithm, e.g., in terms of the total number of asynchronous communication rounds needed for termination [15]. On a different level Obenshain et al [47] design and construct an intrusion-tolerant overlay capable of tolerating Byzantine actions, based on the key understanding that no overlay node should be trusted or given preference. The authors use a maximal topology with minimal weights to prevent routing attacks at the overlay level and rely on source routing augmented with redundant dissemination methods to limit the effect of compromised forwarder processes.…”
Section: A Byzantine Reliable Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…Later works tried to further optimize this algorithm, e.g., in terms of the total number of asynchronous communication rounds needed for termination [15]. On a different level Obenshain et al [47] design and construct an intrusion-tolerant overlay capable of tolerating Byzantine actions, based on the key understanding that no overlay node should be trusted or given preference. The authors use a maximal topology with minimal weights to prevent routing attacks at the overlay level and rely on source routing augmented with redundant dissemination methods to limit the effect of compromised forwarder processes.…”
Section: A Byzantine Reliable Communicationmentioning
confidence: 99%
“…Unlike our RT-ByzCast algorithm, the solutions of [13]- [15], [47] do not provide timeliness guarantees on message delivery, even when applied to weakly synchronous networks such as the one we consider in this paper.…”
Section: A Byzantine Reliable Communicationmentioning
confidence: 99%
“…The attacker will be able to access these values, and consequently encrypted messages, via compromising the intermediate nodes. Similar to KPsec, [25] strives to establish end-to-end secure communications by providing disjoint overlay paths. Unlike KPsec, however, it relies on a backbone infrastructure.…”
Section: End-to-end Communicationmentioning
confidence: 99%
“…To this extent, they often offer remote access to services and relevant information, and they may consequently be subject to (cyber)attacks [2], [6], [92], [95]. In the last decade, such cyberthreats had a constantly growing impact as pointed out by several reports [7], [8].…”
Section: Introductionmentioning
confidence: 99%