Intrusion Survivability for Commodity Operating Systems

被引:0
|
作者
Chevalier, Ronny [1 ,2 ]
Plaquin, David [1 ]
Dalton, Chris [1 ]
Hiet, Guillaume [2 ]
机构
[1] HP Labs, Palo Alto, CA 94304 USA
[2] CNRS, CentraleSupelec, IRISA, Inria, Paris, France
来源
关键词
Intrusion survivability; intrusion response; intrusion recovery;
D O I
10.1145/3419471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an orchestration of fine-grained recovery and per-service responses (e.g., privileges removal). Such an approach may put the system into a degraded mode. This degraded mode prevents attackers to reinfect the system or to achieve their goals if they managed to reinfect it. It maintains the availability of core functions while waiting for patches to be deployed. We devised a cost-sensitive response selection process to ensure that while the service is in a degraded mode, its core functions are still operating. We built a Linux-based prototype and evaluated the effectiveness of our approach against different types of intrusions. The results show that our solution removes the effects of the intrusions, that it can select appropriate responses, and that it allows services to survive when reinfected. In terms of performance overhead, in most cases, we observed a small overhead, except in the rare case of services that write many small files asynchronously in a burst, where we observed a higher but acceptable overhead.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems
    Chevalier, Ronny
    Plaquin, David
    Dalton, Chris
    Hiet, Guillaume
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 762 - 775
  • [2] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1377 - 1391
  • [3] On Survivability of Mobile Cyber Physical Systems with Intrusion Detection
    Robert Mitchell
    Ing-Ray Chen
    [J]. Wireless Personal Communications, 2013, 68 : 1377 - 1391
  • [4] Improving the reliability of commodity operating systems
    Swift, MM
    Bershad, BN
    Levy, HM
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2005, 23 (01): : 77 - 110
  • [5] SoK: Rowhammer on Commodity Operating Systems
    Zhang, Zhi
    Chen, Decheng
    Qi, Jiahao
    Cheng, Yueqiang
    Jiang, Shijie
    Lin, Yiyang
    Gao, Yansong
    Nepal, Surya
    Zou, Yi
    Zhang, Jiliang
    Xiang, Yang
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 436 - 452
  • [6] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
  • [7] SLIC: An extensibility system for commodity operating systems
    Ghormley, DP
    Petrou, D
    Anderson, TE
    Rodrigues, SH
    [J]. PROCEEDINGS OF THE USENIX 1998 ANNUAL TECHNICAL CONFERENCE, 1998, : 39 - 52
  • [8] HPMMAP: Lightweight Memory Management for Commodity Operating Systems
    Kocoloski, Brian
    Lange, John
    [J]. 2014 IEEE 28TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM, 2014,
  • [9] Disco: Running commodity operating systems on scalable multiprocessors
    Bugnion, E
    Devine, S
    Govil, K
    Rosenblum, M
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1997, 15 (04): : 412 - 447
  • [10] CSR: Core Surprise Removal in Commodity Operating Systems
    Shalev, Noam
    Harpaz, Eran
    Porat, Hagar
    Keidar, Idit
    Weinsberg, Yaron
    [J]. ACM SIGPLAN NOTICES, 2016, 51 (04) : 773 - 787