Title :
A replication- and checkpoint-based approach for anomaly-based intrusion detection and recovery
Author :
Agbaria, Adnan ; Friedman, Roy
Author_Institution :
Coordinated Sci. Lab., Illinois Univ., Urbana, IL, USA
Abstract :
The common approach to detecting anomaly-based intrusion is by replicating the computation and running a Byzantine agreement protocol among all replicas. However, Byzantine agreement incurs high communication overhead and also requires the use of more than 2t replicas in order to overcome t such failures. However, for many applications, and in particular scientific computation, it is possible to achieve the same goal with much lower average communication and replication overheads. This paper presents a new approach for detecting an intrusion by combining checkpoint/restart with replication. The main benefit of the approach is that we replicate the execution into only t+1 replicas, and invoke a Byzantine agreement only if we suspect an anomalous behavior that could be observed using checkpointing techniques. If a failure occurs, it is detected using any Byzantine agreement protocol that can agree on a recent valid system´s state. Such a Byzantine agreement protocol also identifies the compromised nodes and eliminates them, so the computation can proceed with only t+1 replicas until the next failure occurs.
Keywords :
checkpointing; distributed processing; fault tolerant computing; protocols; security of data; Byzantine agreement protocol; anomaly-based intrusion detection; checkpointing techniques; replication-based approach; scientific computation; Checkpointing; Computer hacking; Computer science; Contracts; Costs; Distributed computing; Grid computing; Intrusion detection; Peer to peer computing; Protocols;
Conference_Titel :
Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on
Print_ISBN :
0-7695-2328-5
DOI :
10.1109/ICDCSW.2005.21