Proceedings. 14th Symposium on Reliable Distributed Systems
DOI: 10.1109/reldis.1995.518718
|View full text |Cite
|
Sign up to set email alerts
|

A longitudinal survey of Internet host reliability

Abstract: An accurate estimate of host reliability is important for correct analysis of many fault-tolerance and replication mechanisms. In a previous study, we estimated host system reliability by querying a large number of hosts to find how long they had been functioning, estimating the mean timeto-failure (MTTF) and availability from those measures, and in turn deriving an estimate of the mean time-to-repair (MTTR). Howevel; this approach had a bias towards more reliable hosts that could result in overestimating MTTR… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
45
1
2

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 89 publications
(49 citation statements)
references
References 5 publications
(1 reference statement)
1
45
1
2
Order By: Relevance
“…Long et al [23] studied the availability of hosts on the Internet, and their study is perhaps the most similar to ours; however, we focus on the availability of dedicated infrastructure and our measurements are much more recent (their study was conducted in 1995).…”
Section: Availabilitymentioning
confidence: 84%
“…Long et al [23] studied the availability of hosts on the Internet, and their study is perhaps the most similar to ours; however, we focus on the availability of dedicated infrastructure and our measurements are much more recent (their study was conducted in 1995).…”
Section: Availabilitymentioning
confidence: 84%
“…Sen and Wang [14] described a similar study using passive measurement of flow-level data from multiple routers across a large tier-1 ISP backbone. Finally, Long et al [8] measured workstation availability in the Internet using an active probing methodology. Unfortunately, all of these approaches rely on IP addresses to uniquely identify individual hosts over time.…”
Section: Related Workmentioning
confidence: 99%
“…When a malware is detected on a system by the local agent, the information data about the intrusion that is submitted to the central database is shown. In the paper [19], [20] it is the unique identification string of the compromised system, the IP of the compromised system, the time of the event, and the detected malware.…”
Section: IImentioning
confidence: 99%