In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In the Internet age, how do we warn vast numbers of computers about impending cyber attacks? Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems and so forth. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself. This work describes an alternative system, "Revere", that addresses these problems. Revere builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes.
It also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure Revere overlay networks, considering possible attacks and countermeasures. The book presents experimental measurements of a prototype implementation of Revere gathered using a large-scale oriented approach. These measurements suggest that Revere can deliver security updates at the required scale, speed and resiliency for a reasonable cost. The text is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. It should also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by Revere. The Revere solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here should be helpful in designing a customized approach for such systems.
- ISBN:
- 9781402073052
- 9781402073052
-
Category:
- Data encryption
- Format:
- Hardback
- Publication Date:
-
30-11-2002
- Language:
- English
- Publisher:
- Kluwer Academic Publishers
- Country of origin:
- United States
- Pages:
- 157
- Dimensions (mm):
- 235x155x11mm
- Weight:
- 0.94kg
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: