Skip to main content

Unreliable intrusion detection in distributed computations

Publication ,  Conference
Malkhi, D; Reiter, M
Published in: Proceedings of the Computer Security Foundations Workshop
January 1, 1997

Distributed coordination is difficult, especially when the system may suffer intrusions that corrupt some component processes. In this paper we introduce the abstraction of a failure detector that a process can use to (imperfectly) detect the corruption (Byzantine failure) of another process. In general, our failure detectors can be unreliable, both by reporting a correct process to be faulty or by reporting a faulty process to be correct. However, we show that if these detectors satisfy certain plausible properties, then the well-known distributed consensus problem can be solved. We also present a randomized protocol using failure detectors that solves the consensus problem if either the requisite properties of failure detectors hold or if certain highly probable events eventually occur. This work can be viewed as a generalization of benign failure detectors popular in the distributed computing literature.

Duke Scholars

Published In

Proceedings of the Computer Security Foundations Workshop

ISSN

1063-6900

Publication Date

January 1, 1997

Start / End Page

116 / 124
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Malkhi, D., & Reiter, M. (1997). Unreliable intrusion detection in distributed computations. In Proceedings of the Computer Security Foundations Workshop (pp. 116–124).
Malkhi, D., and M. Reiter. “Unreliable intrusion detection in distributed computations.” In Proceedings of the Computer Security Foundations Workshop, 116–24, 1997.
Malkhi D, Reiter M. Unreliable intrusion detection in distributed computations. In: Proceedings of the Computer Security Foundations Workshop. 1997. p. 116–24.
Malkhi, D., and M. Reiter. “Unreliable intrusion detection in distributed computations.” Proceedings of the Computer Security Foundations Workshop, 1997, pp. 116–24.
Malkhi D, Reiter M. Unreliable intrusion detection in distributed computations. Proceedings of the Computer Security Foundations Workshop. 1997. p. 116–124.

Published In

Proceedings of the Computer Security Foundations Workshop

ISSN

1063-6900

Publication Date

January 1, 1997

Start / End Page

116 / 124