Finite memory: A vulnerability of intrusion-tolerant systems

Giuliana Santos Veronese, Miguel Correia, Cheuk Lung Lau, Paulo Verissimo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused by temporary network partitions. In this scenario, attackers can force buffer overflows in order to leave the system in an inconsistent state or to prevent it from doing progress, causing a denial of service. This paper is about the effects that finite memory has on intrusion-tolerant protocols and systems. We present the problem and propose a generic mitigation technique based on repair nodes that reduces the buffer space requirements. An experimental evaluation of the buffer usage with and without this technique is presented, allowing to assess in practice the effects of finite memory in a real, albeit simple, intrusion-tolerant system. © 2008 IEEE.
Original languageEnglish (US)
Title of host publicationProceedings of the 7th IEEE International Symposium on Networking Computing and Applications, NCA 2008
PublisherIEEE Computer [email protected]
Pages37-44
Number of pages8
ISBN (Print)9780769531922
DOIs
StatePublished - Jan 1 2008
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2021-03-16

Fingerprint

Dive into the research topics of 'Finite memory: A vulnerability of intrusion-tolerant systems'. Together they form a unique fingerprint.

Cite this