The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems

To meet the demand for seamless real-time services with limited resources of ubiquitous computing environments, this paper suggests a new virtualization-based server cluster system introducing three schemes: simplified rotation process to reduce system overhead, exposure time adjustment to prevent the degradation of system performance, and spare server insertion to cope with heavy incoming packets. It is verified for ubiquitous computing systems which should satisfy strict operational constraints with limited resources that the proposed schemes enable the systems to achieve higher levels of service quality as well as to stand up to distributed denial of service (DDoS) attacks.

[1]  Hyunsoo Yoon,et al.  The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-Based VM Selection , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[2]  Arun K. Sood,et al.  Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.

[3]  Gernot Heiser,et al.  Hardware-supported virtualization on ARM , 2011, APSys.

[4]  Arun K. Sood,et al.  Closing cluster attack windows through server redundancy and rotations , 2006 .

[5]  Bernd Freisleben,et al.  Securing stateful grid servers through virtual server rotation , 2008, HPDC '08.

[6]  Vincent Nicomette,et al.  The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.

[7]  Arun K. Sood,et al.  Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[8]  Herb Schwetman,et al.  CSIM19: a powerful tool for building system models , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[9]  Hyunsoo Yoon,et al.  A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology , 2013, The Journal of Supercomputing.

[10]  Hyunsoo Yoon,et al.  The design of adaptive intrusion tolerant system(ITS) based on historical data , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[11]  Arun K. Sood,et al.  Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security , 2006, J. Networks.