Byzantine Replication Under Attack

被引:25
作者
Amir, Yair [1 ]
Coan, Brian [2 ]
Kirsch, Jonathan [1 ]
Lane, John [1 ]
机构
[1] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 21218 USA
[2] Telcordia Technol, Piscataway, NJ 08854 USA
来源
2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC | 2008年
基金
美国国家科学基金会;
关键词
Byzantine; replication; fault tolerance; performance; attacks;
D O I
10.1109/DSN.2008.4630088
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, faulty processors can, in some protocols, significantly degrade performance by causing the system to make progress tit an extremely slow rate. While "correct" in the traditional sense, systems vulnerable to such performance degradation are of limited practical use in adversarial environments. This paper argues that techniques for mitigating such performance attacks are needed to bridge this "practicality gap" for intrusion-tolerant replication systems. We propose a new performance-oriented correctness criterion, and we show how failure to meet this criterion can lead to performance degradation. We present a new Byzantine replication protocol that achieves the criterion and evaluate its performance in fault-free configurations and when under attack.
引用
收藏
页码:197 / +
页数:2
相关论文
共 29 条
[1]  
Abd-El-Malek M, 2005, USENIX Association Proceedings of the 4th Usenix Conference on File and Storage Technologies, P59
[2]  
AMIR Y, 2008, CNDS20081 J HOPK U
[3]   Customizable fault tolerance for wide-area replication [J].
Amir, Yair ;
Coan, Brian ;
Kirsch, Jonathan ;
Lane, John .
SRDS 2007: 26TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2007, :66-+
[4]  
Amir Yair., 2006, I C DEPEND SYS NETWO, P105
[5]  
Ben-Or Michael, 1983, Proceedings of the second ACM Symposium on Principles of Distributed Computing (PODC), P27
[6]  
Blomer J., 1995, Technical Report TR-95-048
[7]   Secure intrusion-tolerant replication on the Internet [J].
Cachin, C ;
Poritz, JA .
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, :167-176
[8]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[9]   How to tolerate half less one Byzantine nodes in practical distributed systems [J].
Correia, M ;
Neves, NF ;
Veríssimo, P .
23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, :174-183
[10]  
Cowling J, 2006, USENIX ASSOCIATION 7TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P177