The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model

This paper proposes a strategy and conception of hierarchical recovery,which is based on the proactive-reactive intrusion tolerance recovery and integrated the process level recovery, object level recovery and system level recovery. In this way, we can decrease the recovery grain size and avoid the waste of time and space results from the whole recovery of the part fail and increase the flexibility and reliability. In this paper, we give the basic strategy and method, and finally our simulation experiments demonstrate that the recovery based on the hierarchical model can decrease the frequency of system level recovery and the overall recovery time well.

[1]  Rabih Zbib,et al.  Intrusion tolerant middleware , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[2]  Rahul Singhal,et al.  Azvasa:- Byzantine Fault Tolerant Distributed Commit with Proactive Recovery , 2009, 2009 Second International Conference on Emerging Trends in Engineering & Technology.

[3]  David E. Bakken,et al.  Developing a heterogeneous intrusion tolerant CORBA system , 2002, Proceedings International Conference on Dependable Systems and Networks.

[4]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[5]  Wenbing Zhao,et al.  Proactive Service Migration for Long-Running Byzantine Fault Tolerant Systems , 2008, IET Softw..

[6]  Rüdiger Kapitza,et al.  Hypervisor-Based Efficient Proactive Recovery , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[7]  Miguel Correia,et al.  Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.

[8]  Priya Narasimhan,et al.  Experiences, strategies, and challenges in building fault-tolerant CORBA systems , 2004, IEEE Transactions on Computers.