Disseminating Security Updates at Internet Scale

Author:   Jun Li ,  Peter Reiher ,  Gerald J. Popek
Publisher:   Springer-Verlag New York Inc.
Edition:   2003 ed.
Volume:   8
ISBN:  

9781402073052


Pages:   157
Publication Date:   30 November 2002
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $361.68 Quantity:  
Add to Cart

Share |

Disseminating Security Updates at Internet Scale


Add your own review!

Overview

"In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In the Internet age, how do we warn vast numbers of computers about impending cyber attacks? Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems and so forth. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself. This work describes an alternative system, ""Revere"", that addresses these problems. Revere builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. It also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure Revere overlay networks, considering possible attacks and countermeasures. The book presents experimental measurements of a prototype implementation of Revere gathered using a large-scale oriented approach. These measurements suggest that Revere can deliver security updates at the required scale, speed and resiliency for a reasonable cost. The text is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. It should also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by Revere. The Revere solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here should be helpful in designing a customized approach for such systems."

Full Product Details

Author:   Jun Li ,  Peter Reiher ,  Gerald J. Popek
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   2003 ed.
Volume:   8
Dimensions:   Width: 15.50cm , Height: 1.10cm , Length: 23.50cm
Weight:   0.940kg
ISBN:  

9781402073052


ISBN 10:   1402073054
Pages:   157
Publication Date:   30 November 2002
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

1. Introduction.- 1.1 Case Studies.- 1.2 Goal of Revere.- 1.3 Assumptions.- 1.4 Challenges.- 1.5 Revere Overview.- 1.6 Key Contributions of This Research.- 1.7 Roadmap of This Book.- 2. Assurance via Redundancy.- 2.1 The Redundancy Approach.- 2.2 Interruption Threats.- 2.3 Transmission Primitives.- 2.4 Assurance via Redundancy.- 2.5 Employing Redundancy in Revere.- 2.6 Conclusions.- 3. RBone: A Self-Organized Resilient Overlay Network.- 3.1 Principles for Building an RBone.- 3.2 RBone Formation.- 3.3 Adaptive Management of RBone.- 3.4 Messages and Data Structures.- 3.5 Building a Common RBone.- 3.6 Conclusions.- 4. Dissemination Procedure.- 4.1 Dissemination Principle.- 4.2 Dissemination Center.- 4.3 Security Update Format.- 4.4 Pushing: A Store-And-Forward Mechanism.- 4.5 Pulling Security Updates.- 4.6 Open Issues.- 4.7 Conclusions.- 5. Security.- 5.1 Assumptions.- 5.2 Security of Dissemination Procedure.- 5.3 Securely Building and Maintaining RBones.- 5.4 Attacks and Countermeasures.- 5.5 Open Issues.- 5.6 Conclusions.- 6. Real Measurement Under Virtual Topology.- 6.1 Metrics.- 6.2 Overloading Approach.- 6.3 Measurement Procedure.- 6.4 Results and Analysis.- 6.5 Open Issues.- 6.6 Conclusions.- 7. Related Work.- 7.1 General-Purpose Distribution Services.- 7.2 Special-Purpose Distribution Services.- 7.3 Information Delivery Structures.- 7.4 Security.- 7.5 Conclusions.- 8. Future Work.- 8.1 Open Issues Discussed in Previous Chapters.- 8.2 Think More Beyond Today.- 9. Conclusions.- 9.1 Summary of the Problem.- 9.2 The Revere Solution.- 9.3 Contributions of Revere.- 9.4 Broad Lessons.- 9.5 Final Comments.- References.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List