Experiences with building an intrusion-tolerant group communication system

TitleExperiences with building an intrusion-tolerant group communication system
Publication TypeJournal Articles
Year of Publication2008
AuthorsRamasamy HGV, Pandey P, Cukier M, Sanders WH
JournalSoftware: Practice and Experience
Volume38
Issue6
Pagination639 - 666
Date Published2008///
ISBN Number1097-024X
Keywordsdistributed protocols, experimental evaluation, Fault tolerance, Group communication, intrusion tolerance
Abstract

There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide these properties in the presence of malicious faults resulting from intrusions. We describe the systematic transformation of a crash-tolerant GCS, namely C-Ensemble, into an intrusion-tolerant GCS, the ITUA GCS. To perform the transformation, we devised intrusion-tolerant versions of key group communication protocols. We then inserted implementations of the protocols into C-Ensemble and made significant changes to the rest of the C-Ensemble protocol stack to make the stack intrusion tolerant. We quantify the cost of providing intrusion-tolerant group communication in two ways. First, we quantify the implementation effort by presenting a detailed analysis of the amount of change required to the original C-Ensemble system. In doing so, we provide insight into the choice of building an intrusion-tolerant GCS from scratch versus building one by leveraging a crash-tolerant implementation. Second, we quantify the run-time performance cost of tolerating intrusions by presenting results from an experimental evaluation of the main intrusion-tolerant microprotocols. The results are analyzed to identify the parts that contribute the most overhead while providing intrusion tolerance during both normal operation and recovery from intrusions. Copyright © 2007 John Wiley & Sons, Ltd.

URLhttp://onlinelibrary.wiley.com/doi/10.1002/spe.848/abstract
DOI10.1002/spe.848