Abstract
This paper proposes a strategy and conception of hierarchical recovery, which is based on the proactive-reactive intrusion tolerance recovery and integrated the process level recovery, object level recovery and system level recovery. In this way, we can decrease the recovery grain size and avoid the waste of time and space results from the whole recovery of the part fail and increase the flexibility and reliability. In this paper, we give the basic strategy and method, and finally our simulation experiments demonstrate that the recovery based on the hierarchical model can decrease the frequency of system level recovery and the overall recovery time well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, F., Gong, F., Jou, F., Wang, R.: SITAR: A scalable intrusion tolerant architecture for distributed service. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pp. 38–45 (2001)
Mahajan, S., Singhal, R.: Azvasa:- Byzantine Fault Tolerant Distributed Commit with Proactive Recovery. In: Emerging Trends in Engineering and Technology, ICETET (2009)
Reiser, H.P., Kapitza, R.: Hypervisor-Based Efficient Proactive Recovery. Reliable Distributed Systems (2007)
Sousa, P., Bessani, A.N., et al.: Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Transactions on Parallel and Distributed Systems 21(4), 452–465 (2010)
Zhao, W., Zhang, H.: Proactive service migration for long-running Byzantine fault-tolerant systems. IET Software 3(2), 154–164 (2009)
Umar, A., Anjum, F., et al.: Intrusion tolerant middleware. In: DARPA Information Survivability Conference & Exposition II (2001)
Felber, P., Narasimhan, P.: Experiences, strategies, and challenges in building fault-tolerant CORBA systems. IEEE Transactions on Computers 53(5), 497–511 (2004)
Sames, D., Matt, B., et al.: Developing a heterogeneous intrusion tolerant CORBA system. Dependable Systems and Networks (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, Jh., Wang, Ff. (2011). The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-23971-7_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23970-0
Online ISBN: 978-3-642-23971-7
eBook Packages: Computer ScienceComputer Science (R0)