ByzID: Byzantine fault tolerance from intrusion detection

S Duan, K Levitt, H Meling, S Peisert… - 2014 IEEE 33rd …, 2014 - ieeexplore.ieee.org
S Duan, K Levitt, H Meling, S Peisert, H Zhang
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 2014ieeexplore.ieee.org
Building robust network services that can withstand a wide range of failure types is a
fundamental problem in distributed systems. The most general approach, called Byzantine
fault tolerance, can mask arbitrary failures. Yet it is often considered too costly to deploy in
practice, and many solutions are not resilient to performance attacks. To address this
concern we leverage two key technologies already widely deployed in cloud computing
infrastructures: replicated state machines and intrusion detection systems. First, we have …
Building robust network services that can withstand a wide range of failure types is a fundamental problem in distributed systems. The most general approach, called Byzantine fault tolerance, can mask arbitrary failures. Yet it is often considered too costly to deploy in practice, and many solutions are not resilient to performance attacks. To address this concern we leverage two key technologies already widely deployed in cloud computing infrastructures: replicated state machines and intrusion detection systems. First, we have designed a general framework for constructing Byzantine failure detectors based on an intrusion detection system. Based on such a failure detector, we have designed and built a practical Byzantine fault-tolerant protocol, which has costs comparable to crash-resilient protocols like Paxos. More importantly, our protocol is particularly robust against several key attacks such as flooding attacks, timing attacks, and fairness attacks, that are typically not handled well by Byzantine fault masking procedures.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果