Constructing a Practical Intrusion Tolerant Replication System