A Replication Protocol for an Intrusion-Tolerant System Design

To my Parents and Family iii Acknowledgments In writing this thesis many people have provided me with invaluable support in one form or another. I am forever indebted to you all. Specifically, I would like to thank my advisor Prof. William H. Sanders for guiding and encouraging me through this research and the beginnings of my graduate career. Dr. Michel Cukier has also helped me immensely with his many insightful suggestions about my work. in completing the implementation of this work. Her wonderful patience and hard work in helping me learn the AQuA framework and ACE, as well as in helping me implement and debug significant portions of the initial code, made this work possible. I am grateful to the other members of my office community, a great place to spend my time. I am also very thankful to Jenny Applequist for her help at all times and, in particular, in editing this thesis.00-C-0172. In particular, I would like to thank Dr. Jaynarayan Lala, Program manager of OASIS, for his guidance and support of the ITUA project. Finally, I would like to thank my close friends, both local and afar, for helping me stay focused and sane while working on this thesis. In particular my roommate and co-worker Ryan Lefever has been a great friend and helped me to stay on track at times when I might have given up. Maria Jimenez has been a wonderfully supportive and understanding friend throughout the process. Her patience and support during the many late nights and iv stressful times was invaluable. Lastly, my parents have been integral in my reaching this goal successfully. To them, I am and forever will be, grateful for all they have done on my behalf.

[1]  Mark Garland Hayden,et al.  The Ensemble System , 1998 .

[2]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[3]  William H. Sanders,et al.  Quantifying the cost of providing intrusion tolerance in group communication systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[4]  Nancy R. Mead,et al.  Survivability: Protecting Your Critical Systems , 1999, IEEE Internet Comput..

[5]  Priya Narasimhan,et al.  A fault tolerance framework for CORBA , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[6]  Louise E. Moser,et al.  The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[7]  Prashant Pandey,et al.  Reliable Delivery and Ordering Mechanisms for an Intrusion-Tolerant Group Communication System , 2001 .

[8]  Willy Zwaenepoel,et al.  Distributed process groups in the V Kernel , 1985, TOCS.

[9]  Kenneth P. Birman,et al.  Building reliable interoperable distributed objects with the maestro tools , 1998 .

[10]  John A. Zinky,et al.  QoS Aspect Languages and Their Runtime Integration , 1998, LCR.

[11]  Jo-Mei Chang,et al.  Reliable broadcast protocols , 1984, TOCS.

[12]  William H. Sanders,et al.  An Adaptive Algorithm for Tolerating Value Faults and Crash Failures , 2001, IEEE Trans. Parallel Distributed Syst..

[13]  Kenneth P. Birman,et al.  The process group approach to reliable distributed computing , 1992, CACM.

[14]  David E. Bakken,et al.  Developing a heterogeneous intrusion tolerant CORBA system , 2002, Proceedings International Conference on Dependable Systems and Networks.

[15]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Robbert van Renesse,et al.  Reliable Distributed Computing with the Isis Toolkit , 1994 .

[17]  Paul Rubel,et al.  Passive Replication in the AQuA System , 2000 .

[18]  Antonio Casimiro,et al.  The timely computing base: Timely actions in the presence of uncertain timeliness , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[19]  William H. Sanders,et al.  Intrusion Tolerance Approaches in ITUA , 2001 .

[20]  Robbert van Renesse,et al.  Horus: a flexible group communication system , 1996, CACM.

[21]  Louise E. Moser,et al.  Totem: a fault-tolerant multicast group communication system , 1996, CACM.

[22]  Dan Boneh,et al.  Building intrusion tolerant applications , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[23]  William H. Sanders,et al.  AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects , 2003, IEEE Trans. Computers.

[24]  Yoram Moses,et al.  Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds , 1998, SIAM J. Comput..

[25]  William H. Sanders,et al.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[26]  Priya Narasimhan,et al.  Providing support for survivable CORBA applications with the Immune system , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[27]  Miguel Correia,et al.  The Middleware Architecture of MAFTIA: A Blueprint , 2000 .

[28]  Vishu Gupta,et al.  Intrusion-Tolerant State Transfer for Group Communication Systems , 2003 .

[29]  Yansong Ren,et al.  AQuA: A Framework for Providing Adaptive Fault Tolerance to Distributed Applications , 2001 .

[30]  Danny Dolev,et al.  The Transis approach to high availability cluster communication , 1996, CACM.