Title :
Experiences on intrusion tolerance distributed systems
Author :
Feng, Dengguo ; Xiang, Ji
Author_Institution :
Inst. of Software, Chinese Acad. of Sci., Beijing, China
Abstract :
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensitive information, create some false information, or prevent legitimate users from using the system. An intrusion-tolerant distributed system is a system which is designed so that any intrusion into a part of the system will not endanger confidentiality, integrity and availability. This paper describes two such systems we are developing: an intrusion tolerance CA system and a survivable repository, which are highly resilient to both insider and outsider attacks that compromise one or more components.
Keywords :
certification; data integrity; data privacy; distributed processing; security of data; certification authority; data confidentiality; data integrity; denial of service; intrusion tolerance distributed systems; malicious attacks; sensitive information; survivable repository; system availability; Computer architecture; Computer crime; Computer hacking; Control systems; Cryptographic protocols; Cryptography; Fault tolerant systems; Protection; Redundancy; Web and internet services;
Conference_Titel :
Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International
Print_ISBN :
0-7695-2413-3
DOI :
10.1109/COMPSAC.2005.74