SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System

被引:8
|
作者
Xiong, Xi [1 ]
Jia, Xiaoqi [3 ]
Li, Peng [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Penn State Univ, Coll Lib Sci & Technol, University Pk, PA 16802 USA
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
关键词
intrusion recovery; availability; taint tracking; virtual machines;
D O I
10.1109/ACSAC.2009.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recovering from intrusions for a compromised computer system is a challenging job, especially for systems that run continuous services. Current intrusion recovery techniques often do not preserve the accumulated useful state of running applications and have very limited system availability when performing recovery routines. In this paper, we propose SHELF, an on-the-fly intrusion recovery prototype system that provides a comprehensive solution to preserve business continuity, availability and recovery accuracy. SHELF preserves accumulated clean states for infected applications and files so that they can continue with the most recent pre-infection states after recovery. Moreover, SHELF leverages OS-aware taint tracking techniques to swiftly determine the sources of intrusion and assess system-wide damages caused by the intrusion. SHELF uses quarantine methods to prevent infection propagation so that uninfected and recovered objects can provide availability during the recovery phase. We integrate SHELF prototype in a virtualization environment to achieve user transparency and protection. Our evaluation shows that SHELF can perform accurate recovery on-the-fly effectively with an acceptable performance overhead.
引用
收藏
页码:484 / +
页数:2
相关论文
共 50 条
  • [1] From high availability and disaster recovery to business continuity solutions
    Lumpp, Th.
    Schneider, J.
    Holtz, J.
    Mueller, M.
    Lenz, N.
    Biazetti, A.
    Petersen, D.
    [J]. IBM SYSTEMS JOURNAL, 2008, 47 (04) : 605 - 619
  • [2] Business continuity and availability planning
    Bennett, John
    [J]. Infosecurity, 2007, 4 (03)
  • [3] IT Disaster Recovery System to Ensure the Business Continuity of an Organization
    Fernando, Mahendra Sagara
    [J]. 2017 NATIONAL INFORMATION TECHNOLOGY CONFERENCE (NITC), 2017, : 46 - 48
  • [4] Business Continuity & Recovery Strategies
    Galloway, Merrilee
    Dyment, Mark
    [J]. GENETIC ENGINEERING & BIOTECHNOLOGY NEWS, 2009, 29 (05): : 58 - 58
  • [5] Views on business continuity and disaster recovery
    Sawalha, Ihab Hanna
    [J]. INTERNATIONAL JOURNAL OF EMERGENCY SERVICES, 2021, 10 (03) : 351 - 365
  • [6] Business Continuity: Beyond Disaster Recovery
    Costello, Tom
    [J]. IT PROFESSIONAL, 2012, 14 (05) : 64 - +
  • [7] Disaster recovery planning and business continuity for informaticians
    Cervone H.F.
    [J]. Cervone, H. Frank (fcervone@uic.edu), 1600, Emerald Group Holdings Ltd. (33): : 78 - 81
  • [8] Business Recovery and Continuity after a Major Loss
    不详
    [J]. MANUFACTURING ENGINEERING, 2017, 159 (03): : 42 - 42
  • [9] Special issue: Business continuity and disaster recovery
    不详
    [J]. NEC TECHNICAL JOURNAL, 2006, 1 (04): : COVER2 - COVER2
  • [10] A Methodology for High Availability of Data for Business Continuity Planning Disaster Recovery in a Grid using Replication in a Distributed Database
    Chidambaram, J.
    Rao, P. A. Narasimha
    Aneesh, C. Sreevallabh
    Prabhu, C. S. R.
    Wankar, Rajeev
    Agarwal, Arun
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 2150 - +