A Novel Intrusion Tolerant System Using Live Migration

SUMMARY This letter proposes a novel intrusion tolerant system con- sisting of several virtual machines (VMs) that refresh the target system periodically and by live migration , which monitors the many features of the VMs to identify and replace exhausted VMs. The proposed scheme provides adequate performance and dependability against denial of service (DoS) attacks. To show its e ffi ciency and security, we conduct experiments on the CSIM20 simulator, which showed 22% improvement in a normal sit- uation and approximately 77.83% improvement in heavy tra ffi c in terms of the response time compared to that reported in the literature. We measure and compare the response time. The result show that the proposed scheme has shorter response time and maintains than other systems and supports services during the heavy tra ffi c.

[1]  Hyunsoo Yoon,et al.  A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology , 2013, The Journal of Supercomputing.

[2]  Jun Huang,et al.  Virtualization-based Recovery Approach for Intrusion Tolerance , 2013 .

[3]  R. Sindoori,et al.  An Overview of Disaster Recovery in Virtualization Technology , 2013 .

[4]  Lin Li,et al.  Applications of Intrusion-Tolerance Pre-response in the Grid Enterprises , 2012, 2012 Fourth International Conference on Computational and Information Sciences.

[5]  Jian-Hua Huang,et al.  The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model , 2011, WISM.

[6]  Arun K. Sood,et al.  A Comparison of Intrusion-Tolerant System Architectures , 2011, IEEE Security & Privacy.

[7]  Arun K. Sood,et al.  Combining intrusion detection and recovery for enhancing system dependability , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[8]  Binoy Ravindran,et al.  Lightweight Live Migration for High Availability Cluster Service , 2010, SSS.

[9]  Miguel Correia,et al.  Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.

[10]  Arun K. Sood,et al.  Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.

[11]  Hai Jin,et al.  Live migration of virtual machine based on full system trace and replay , 2009, HPDC '09.

[12]  Vincent Nicomette,et al.  The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.

[13]  Alysson Neves Bessani,et al.  The FOREVER service for fault/intrusion removal , 2008, WRAITS '08.

[14]  Tobias Distler,et al.  Efficient state transfer for hypervisor-based proactive recovery , 2008, WRAITS '08.

[15]  Arun K. Sood,et al.  Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[16]  Franklin Webber,et al.  The DPASA Survivable JBI — A High-Water Mark in Intrusion-Tolerant Systems , 2007 .

[17]  William H. Sanders,et al.  An architecture for adaptive intrusion‐tolerant applications , 2006, Softw. Pract. Exp..

[18]  Paulo Veríssimo,et al.  Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.

[19]  Arun K. Sood,et al.  Incorruptible system self-cleansing for intrusion tolerance , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[20]  Y. Huang Self-Cleansing Systems for Intrusion Containment , 2006 .

[21]  William H. Sanders,et al.  Automatic model-driven recovery in distributed systems , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).

[22]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[23]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[24]  Magnus Almgren,et al.  An Architecture for an Adaptive Intrusion-Tolerant Server , 2002, Security Protocols Workshop.

[25]  Noah Treuhaft,et al.  Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .

[26]  Herb Schwetman,et al.  CSIM19: a powerful tool for building system models , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[27]  Yennun Huang,et al.  Software Implemented Fault Tolerance Technologies and Experience , 1993, FTCS.