Practical Intrusion-Tolerant Networks
Title | Practical Intrusion-Tolerant Networks |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Obenshain, D., Tantillo, T., Babay, A., Schultz, J., Newell, A., Hoque, M. E., Amir, Y., Nita-Rotaru, C. |
Conference Name | 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) |
Date Published | jun |
Publisher | IEEE |
ISBN Number | 978-1-5090-1483-5 |
Keywords | composability, computer network security, critical infrastructure, East Asia, Europe, global cloud, high-value applications, Internet, intrusion tolerance, intrusion-tolerant network service, intrusion-tolerant overlay implementation, IP infrastructure, IP networks, malicious attacks, Monitoring, network infrastructure, North America, overlay networks, power grid, pubcrawl, reliability, Resiliency, Resilient Networks, Routing, Semantics |
Abstract | As the Internet becomes an important part of the infrastructure our society depends on, it is crucial to construct networks that are able to work even when part of the network is compromised. This paper presents the first practical intrusion-tolerant network service, targeting high-value applications such as monitoring and control of global clouds and management of critical infrastructure for the power grid. We use an overlay approach to leverage the existing IP infrastructure while providing the required resiliency and timeliness. Our solution overcomes malicious attacks and compromises in both the underlying network infrastructure and in the overlay itself. We deploy and evaluate the intrusion-tolerant overlay implementation on a global cloud spanning East Asia, North America, and Europe, and make it publicly available. |
URL | https://ieeexplore.ieee.org/document/7536504 |
DOI | 10.1109/ICDCS.2016.99 |
Citation Key | obenshain_practical_2016 |
- IP networks
- Semantics
- Routing
- Resilient Networks
- Resiliency
- Reliability
- pubcrawl
- Power Grid
- overlay networks
- North America
- network infrastructure
- Monitoring
- malicious attacks
- composability
- IP infrastructure
- intrusion-tolerant overlay implementation
- intrusion-tolerant network service
- intrusion tolerance
- internet
- high-value applications
- global cloud
- Europe
- East Asia
- critical infrastructure
- computer network security