Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
SHARPE 2002: Symbolic Hierarchical Automated Reliability and Performance Evaluator
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Self-Healing Workflow Systems under Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Independence From Obfuscation: A Semantic Framework for Dive
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Performance and Reliability Analysis ofWeb Server Software Architectures
PRDC '06 Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing
A framework for diversifying windows native APIs to tolerate code injection attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Microreboot — A technique for cheap recovery
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
N-variant systems: a secretless framework for security through diversity
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Zyzzyva: speculative byzantine fault tolerance
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Diverse replication for single-machine Byzantine-fault tolerance
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Modeling and analysis of worm defense using stochastic activity networks
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
An Early Reliability Assessment Model for Data-Flow Software Architectures
ENC '08 Proceedings of the 2008 Mexican International Conference on Computer Science
Identifying Critical Attack Assets in Dependency Attack Graphs
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Virtual machine-based services have become very popular in data centers and cloud computing in recent years. Efficient redundancy technology of virtual machine provides good availability for services; thus, it has become possible to provide continuous services even if the system suffers intrusions. So far, many intrusion tolerant server architectures have been developed based on virtual machine technology in academia and industry. Unfortunately, to the best of our knowledge, there is very little work done on evaluating the survivability of virtual machine-based server architectures in the literature. In this paper, we focus on analyzing and evaluating the survivability of three virtual machine-based architectures, which are load balance server architecture (LBSA), isolated component server architecture (ICSA), and Byzantine fault tolerant server architecture (BFTSA). As a reference, a traditional server cluster without virtual machines is also analyzed and compared. We model different architectures with Continuous Time Markov Chain (CTMC). We analyze the transient behaviors and steady states of different virtual machine-based architectures. Furthermore, the costs of the traditional server cluster and the virtual machine-based architectures are compared in terms of processing costs, memory costs, communication costs, and fail-safe fault tolerance. The results show that BFTSA has better survivability than LBSA and ICSA, but with longer time to reach the steady states and higher communication costs.