Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Fault Forbearance Methods for Randomized Intrusion Tolerance


Affiliations
1 Department of Information Technology, Sri Vidya College of Engineering & Technology, India
     

   Subscribe/Renew Journal


The main objective of this project is to provide services and randomize the intrusion tolerance in both LAN and WAN networks. Intrusion into a part of the system should give access only to non-significant information, intrusion-tolerant spread systems, there is an necessary predicament: consent Existing Protocols only Behavior-based (or anomaly detection) systems Knowledge-based (or misuse detection) systems. This paper describes the implementation of a stack of randomized intrusion-tolerant protocols and evaluates their performance under different fault masses .One of the main purposes is to explain that randomization can be efficient and should be regarded as a valid solution for practical intrusion tolerant distributed systems. The paper has two main contributions:(1) it presents the design and implementation of a stack of randomized intrusion tolerant protocols, discussing several optimizations-to the best of our knowledge, the achievement of a stack with the four structural properties above is novel; (2) it provides a detailed evaluation of RITAS in both LAN and WAN settings, showing that it has motivating latency and throughput values. Randomization is only one of the techniques that can be used to circumvent the FLP impracticality result. Other techniques include malfunction detectors, unfinished synchrony and circulated wormholes. Some of these techniques have been employed in the past to build other intrusion-tolerant protocol suites.

Keywords

Randomized Protocols.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 244

PDF Views: 3




  • Fault Forbearance Methods for Randomized Intrusion Tolerance

Abstract Views: 244  |  PDF Views: 3

Authors

R. Vikkram
Department of Information Technology, Sri Vidya College of Engineering & Technology, India
M. Sathya Prasath
Department of Information Technology, Sri Vidya College of Engineering & Technology, India
R. Vidhyalakshmi
Department of Information Technology, Sri Vidya College of Engineering & Technology, India

Abstract


The main objective of this project is to provide services and randomize the intrusion tolerance in both LAN and WAN networks. Intrusion into a part of the system should give access only to non-significant information, intrusion-tolerant spread systems, there is an necessary predicament: consent Existing Protocols only Behavior-based (or anomaly detection) systems Knowledge-based (or misuse detection) systems. This paper describes the implementation of a stack of randomized intrusion-tolerant protocols and evaluates their performance under different fault masses .One of the main purposes is to explain that randomization can be efficient and should be regarded as a valid solution for practical intrusion tolerant distributed systems. The paper has two main contributions:(1) it presents the design and implementation of a stack of randomized intrusion tolerant protocols, discussing several optimizations-to the best of our knowledge, the achievement of a stack with the four structural properties above is novel; (2) it provides a detailed evaluation of RITAS in both LAN and WAN settings, showing that it has motivating latency and throughput values. Randomization is only one of the techniques that can be used to circumvent the FLP impracticality result. Other techniques include malfunction detectors, unfinished synchrony and circulated wormholes. Some of these techniques have been employed in the past to build other intrusion-tolerant protocol suites.

Keywords


Randomized Protocols.