Proactive Fortification of Fault-Tolerant Services

  • Authors:
  • Paul Ezhilchelvan;Dylan Clarke;Isi Mitrani;Santosh Shrivastava

  • Affiliations:
  • School of Computing Science, Newcastle University, UK;School of Computing Science, Newcastle University, UK;School of Computing Science, Newcastle University, UK;School of Computing Science, Newcastle University, UK

  • Venue:
  • OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an approach for incorporating intrusion resilience to replicated services, irrespective of the service replication used and of the fault types tolerated. The approach, termed as FORTRESS, involves fortifying a fault-tolerant service using proxies that block clients from accessing the servers directly, and periodically refreshing proxies and servers with diverse executables generated using code randomization. These two features make it hard for an attacker to compromise a server when no proxy has been compromised. An analytical evaluation establishes that if attackers cannot intrude servers without first having compromised a proxy, fortifying even a passively replicated service can offer greater resilience than building that service as a deterministic state machine and actively replicating it over diverse platforms. Finally, the FORTRESS architecture is presented where proactive code randomization is achieved by proactive replacement of server and proxy nodes. Examining the state transfer protocol executed during node replacement shows that the processing overhead per replacement is no more than the overhead for changing the leader or the primary replica in replication management.