Proceedings of the 2010 ACM Symposium on Applied Computing 2010
DOI: 10.1145/1774088.1774183
|View full text |Cite
|
Sign up to set email alerts
|

Improving complex distributed software system availability through information hiding

Abstract: For distributed software systems, ensuring their availability under intentional attacks is critical. Traffic analysis, conducted by the attacker, could reveal the protocol being carried out by the components.Furthermore, having inferred the protocol, the attacker can use the pattern of the messages as a guide to the most critical components. We thwart these directed attacks by using message forwarding to reduce traffic differences, thus diverge attackers from targeted attack to random attack, which probabilist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 22 publications
(17 reference statements)
0
1
0
Order By: Relevance
“…First, the system models are different. In this paper, the system reliability depends on the reliability of a set of selected voting replicas and whether they are compromised or not, while in Wang et al (2010Wang et al ( , 2011, the system reliability is the probability that all critical components survive the attacks. Second, the protection approaches are different.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…First, the system models are different. In this paper, the system reliability depends on the reliability of a set of selected voting replicas and whether they are compromised or not, while in Wang et al (2010Wang et al ( , 2011, the system reliability is the probability that all critical components survive the attacks. Second, the protection approaches are different.…”
Section: Related Workmentioning
confidence: 99%
“…Our earlier work focused on using an information hiding approach to prevent the attackers from quickly identifying the location of critical components in the system (Wang, Leiferman, Ren, Kwiat, & Li, 2010) and deciding optimal resource allocation for improving system reliability under random attack (Wang, Ren, Yue, & Kwiat, 2010, 2011. The current work differs from the previous work in two aspects.…”
Section: Related Workmentioning
confidence: 99%