Journal of Systems and Software
Dependability Modeling and Evaluation of Software Fault-Tolerant Systems
IEEE Transactions on Computers
Proceedings of the First International Workshop on Information Hiding
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
How to Update Dependable Secure Computing Systems from a Survivability Assessment Perspective?
DASC '07 Proceedings of the Third IEEE International Symposium on Dependable, Autonomic and Secure Computing
Typing communicating component assemblages
GPCE '08 Proceedings of the 7th international conference on Generative programming and component engineering
Anomaly detection in the case of message oriented middleware
Proceedings of the 2008 workshop on Middleware security
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
For distributed software systems, ensuring their availability under intentional attacks is critical. Traffic analysis, conducted by the attacker, could reveal the protocol being carried out by the components. Furthermore, having inferred the protocol, the attacker can use the pattern of the messages as a guide to the most critical components. We thwart these directed attacks by using message forwarding to reduce traffic differences, thus diverge attackers from targeted attack to random attack, which probabilistically prolongs the availability of important components in the system. The simulation results also show that message forwarding effectively balance the traffic flow and hence indicate the validity of our approach.