首页> 外文会议>4th ACM symposium on information, computer and communications security 2009 >TimeVM: A Framework for Online Intrusion Mitigation and Fast Recovery Using Multi-Time-Lag Traffic Replay
【24h】

TimeVM: A Framework for Online Intrusion Mitigation and Fast Recovery Using Multi-Time-Lag Traffic Replay

机译:TimeVM:使用多时滞流量重放的在线入侵缓解和快速恢复框架

获取原文
获取原文并翻译 | 示例

摘要

Network intrusions become a signification threat to network servers and its availability. A simple intrusion can suspend the organization's network services and can lead to a financial disaster. In this paper, we propose a framework called TimeVM to mitigate, or even eliminate, the infection of a network intrusion on-line as fast as possible. The framework is based on the virtual machine technology and traffic-replay-based recovery. TimeVM gives the illusion of "time machine". TimeVM logs only the network traffic to a server and replays the logged traffic to multiple "shadow" virtual machines (Shadow VM) after different time delays (time lags). Consequently, each Shadow VM will represent the server at different time in history. When attack/infection is detected, TimeVM enables navigating through the traffic history (logs), picking uninfected Shadow VM, removing the attack traffic, and then fast-replaying the entire traffic history to this Shadow VM. As a result, a typical up-to-date uninfected version of the original system can be constructed. The paper shows the implementation details for TimeVM. It also addresses many practical challenges related to how to configure and deploy TimeVM in a system in order to minimize the recovery time. We present analytical framework and extensive evaluation to validate our approach in different environments.
机译:网络入侵成为对网络服务器及其可用性的重大威胁。简单的入侵会暂停组织的网络服务,并可能导致财务灾难。在本文中,我们提出了一个称为TimeVM的框架,以尽可能减轻或消除网络入侵的感染。该框架基于虚拟机技术和基于流量重播的恢复。 TimeVM给人一种“时间机器”的错觉。 TimeVM仅将网络流量记录到服务器,并在不同的时间延迟(时滞)之后将记录的流量重播到多个“影子”虚拟机(Shadow VM)。因此,每个Shadow VM将在历史记录的不同时间代表服务器。检测到攻击/感染后,TimeVM可以浏览流量历史记录(日志),选择未感染的Shadow VM,删除攻击流量,然后将整个流量历史记录快速重播到此Shadow VM。结果,可以构建原始系统的典型的最新未感染版本。本文显示了TimeVM的实现细节。它还解决了与如何在系统中配置和部署TimeVM以便最小化恢复时间有关的许多实际挑战。我们提供分析框架和广泛的评估,以验证我们在不同环境中的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号