SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System

被引:8
|
作者
Xiong, Xi [1 ]
Jia, Xiaoqi [3 ]
Li, Peng [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Penn State Univ, Coll Lib Sci & Technol, University Pk, PA 16802 USA
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
关键词
intrusion recovery; availability; taint tracking; virtual machines;
D O I
10.1109/ACSAC.2009.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recovering from intrusions for a compromised computer system is a challenging job, especially for systems that run continuous services. Current intrusion recovery techniques often do not preserve the accumulated useful state of running applications and have very limited system availability when performing recovery routines. In this paper, we propose SHELF, an on-the-fly intrusion recovery prototype system that provides a comprehensive solution to preserve business continuity, availability and recovery accuracy. SHELF preserves accumulated clean states for infected applications and files so that they can continue with the most recent pre-infection states after recovery. Moreover, SHELF leverages OS-aware taint tracking techniques to swiftly determine the sources of intrusion and assess system-wide damages caused by the intrusion. SHELF uses quarantine methods to prevent infection propagation so that uninfected and recovered objects can provide availability during the recovery phase. We integrate SHELF prototype in a virtualization environment to achieve user transparency and protection. Our evaluation shows that SHELF can perform accurate recovery on-the-fly effectively with an acceptable performance overhead.
引用
收藏
页码:484 / +
页数:2
相关论文
共 50 条
  • [41] Availability Analysis of an Intrusion Tolerant Distributed Server System With Preventive Maintenance
    Uemura, Toshikazu
    Dohi, Tadashi
    Kaio, Naoto
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2010, 59 (01) : 18 - 29
  • [42] Special contribution article: SunGard 'Availability services' provide business continuity strategies in collaboration with NEC
    Hideyuki, Ogata
    [J]. NEC TECHNICAL JOURNAL, 2006, 1 (04): : 15 - 17
  • [43] Business continuity model.: Regeneration system for manufacturing components
    Marcos-Jorquera, Diego
    Macia-Perez, Francisco
    Gilart-Iglesias, Virgilio
    Berna-Martinez, Jose Vicente
    [J]. 10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 97 - 105
  • [44] Survivability and Business Continuity Management System According to BS 25999
    Boehmer, Wolfgang
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 142 - 147
  • [45] From Hot Ashes to a Cool Recovery: Reducing Risk by Acting on Business Continuity and Disaster Recovery Lessons Learned
    Blanke, Sandra J.
    McGrady, Elizabeth
    [J]. HOME HEALTH CARE MANAGEMENT AND PRACTICE, 2012, 24 (02): : 73 - 80
  • [47] A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System
    Phan The Duy
    Huynh Nhat Hao
    Huynh Minh Chu
    Van-Hau Pham
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 353 - 368
  • [48] Proactive recovery algorithm in the distributed intrusion-tolerance system
    Zhou, Hua
    Meng, Xiang-Ru
    Zhang, Li
    Qiao, Xiang-Dong
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2009, 36 (02): : 378 - 384
  • [49] Comparative Study of Intrusion Detection System and its Recovery mechanism
    Khan, Nabeel Younus
    Rauf, Bilal
    Ahmed, Kabeer
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 627 - 631
  • [50] Proactive Recovery in Intrusion-Tolerant System Based on TTCB
    Zhou Hua
    Zhou Hai-jun
    Ma Jian-feng
    [J]. 2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802