Practical Intrusion-Tolerant Networks

Daniel Obenshain, Thomas Tantillo, Amy Babay, John Schultz, Andrew Newell, Md Edadul Hoque, Yair Amir, Cristina Nita-Rotaru

Research output: Chapter in Book/Entry/PoemConference contribution

13 Scopus citations

Abstract

As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the power grid. We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness. Our solution overcomes malicious attacks and compromises in both the underlying network infrastructure and in the overlay itself. We deploy and evaluate the intrusion-tolerant overlay implementation on a global cloud spanning East Asia, North America, and Europe, and make it publicly available.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE 36th International Conference on Distributed Computing Systems, ICDCS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages45-56
Number of pages12
ISBN (Electronic)9781509014828
DOIs
StatePublished - Aug 8 2016
Externally publishedYes
Event36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016 - Nara, Japan
Duration: Jun 27 2016Jun 30 2016

Publication series

NameProceedings - International Conference on Distributed Computing Systems
Volume2016-August

Other

Other36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016
Country/TerritoryJapan
CityNara
Period6/27/166/30/16

Keywords

  • Intrusion Tolerance
  • Overlay Networks
  • Resilient Networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Practical Intrusion-Tolerant Networks'. Together they form a unique fingerprint.

Cite this