{"title":"拜占庭协议在IPS系统设计中的应用","authors":"F. C. Osorio","doi":"10.1109/PCCC.2007.358936","DOIUrl":null,"url":null,"abstract":"Intrusion detection, prevention & countermeasure systems (IPS) and architectures commonly used in commercial, as well as research environments, suffer from a number of problems that limit their effectiveness. The most common shortcoming of current IPSs is their inability to survive failures, either generated by typical faults or as a result of a deliberate malicious attack. The Wireless System Security Research Laboratory (WSSRL) attempts to correct this situation by developing a secure architecture and fault-resilient engine (SAFE), a system capable of tolerating such failures. This system makes use of solutions to the Byzantine general's problem, developed earlier by Lamport, Shostak, and Pease. Byzantine agreement protocols are used to achieve consensus about which nodes have been compromised or failed, with a series of synchronized, secure rounds of message exchanges. Once a consensus has been reached, the offending nodes can be isolated and countermeasure actions can be initiated by the system. In this manuscript, we investigate the necessary and sufficient conditions for the application of Byzantine agreement protocols to the intrusion detection problem. Further, a first implementation of this algorithm is embedded in the distributed trust manager (DTM) module of SAFE, and is discussed. The algorithms are evaluated in terms of performance (i.e., time to achieve resolution) and ability to detect attacks.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Using Byzantine Agreement in the Design Of IPS Systems\",\"authors\":\"F. C. Osorio\",\"doi\":\"10.1109/PCCC.2007.358936\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection, prevention & countermeasure systems (IPS) and architectures commonly used in commercial, as well as research environments, suffer from a number of problems that limit their effectiveness. The most common shortcoming of current IPSs is their inability to survive failures, either generated by typical faults or as a result of a deliberate malicious attack. The Wireless System Security Research Laboratory (WSSRL) attempts to correct this situation by developing a secure architecture and fault-resilient engine (SAFE), a system capable of tolerating such failures. This system makes use of solutions to the Byzantine general's problem, developed earlier by Lamport, Shostak, and Pease. Byzantine agreement protocols are used to achieve consensus about which nodes have been compromised or failed, with a series of synchronized, secure rounds of message exchanges. Once a consensus has been reached, the offending nodes can be isolated and countermeasure actions can be initiated by the system. In this manuscript, we investigate the necessary and sufficient conditions for the application of Byzantine agreement protocols to the intrusion detection problem. Further, a first implementation of this algorithm is embedded in the distributed trust manager (DTM) module of SAFE, and is discussed. The algorithms are evaluated in terms of performance (i.e., time to achieve resolution) and ability to detect attacks.\",\"PeriodicalId\":356565,\"journal\":{\"name\":\"2007 IEEE International Performance, Computing, and Communications Conference\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE International Performance, Computing, and Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PCCC.2007.358936\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Performance, Computing, and Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PCCC.2007.358936","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Byzantine Agreement in the Design Of IPS Systems
Intrusion detection, prevention & countermeasure systems (IPS) and architectures commonly used in commercial, as well as research environments, suffer from a number of problems that limit their effectiveness. The most common shortcoming of current IPSs is their inability to survive failures, either generated by typical faults or as a result of a deliberate malicious attack. The Wireless System Security Research Laboratory (WSSRL) attempts to correct this situation by developing a secure architecture and fault-resilient engine (SAFE), a system capable of tolerating such failures. This system makes use of solutions to the Byzantine general's problem, developed earlier by Lamport, Shostak, and Pease. Byzantine agreement protocols are used to achieve consensus about which nodes have been compromised or failed, with a series of synchronized, secure rounds of message exchanges. Once a consensus has been reached, the offending nodes can be isolated and countermeasure actions can be initiated by the system. In this manuscript, we investigate the necessary and sufficient conditions for the application of Byzantine agreement protocols to the intrusion detection problem. Further, a first implementation of this algorithm is embedded in the distributed trust manager (DTM) module of SAFE, and is discussed. The algorithms are evaluated in terms of performance (i.e., time to achieve resolution) and ability to detect attacks.