Quantifying the cost of providing intrusion tolerance in group communication systems

Hari Govind V. Ramasamy, Prashant Pandey, James Lyons, Michel Cukier, William H. Sanders

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant microprotocols that have been added to an existing crash-fault-tolerant group communication system. The results are analyzed to identify the parts that contribute the most overhead during provision of intrusion tolerance at the group communication system level.

Original languageEnglish (US)
Title of host publicationFoundations of Intrusion Tolerant Systems, OASIS 2003
EditorsJaynarayan H. Lala
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages241-250
Number of pages10
ISBN (Electronic)076952057X, 9780769520575
DOIs
StatePublished - 2003
EventFoundations of Intrusion Tolerant Systems, OASIS 2003 - Los Alamitos, United States
Duration: Dec 1 2003 → …

Publication series

NameFoundations of Intrusion Tolerant Systems, OASIS 2003

Other

OtherFoundations of Intrusion Tolerant Systems, OASIS 2003
Country/TerritoryUnited States
CityLos Alamitos
Period12/1/03 → …

Keywords

  • Algorithm design and analysis
  • Communication system control
  • Computer crashes
  • Control systems
  • Costs
  • Educational institutions
  • Intelligent control
  • Middleware
  • Multicast protocols
  • Performance analysis

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Quantifying the cost of providing intrusion tolerance in group communication systems'. Together they form a unique fingerprint.

Cite this