首页> 外文期刊>Operating systems review >The Taser Intrusion Recovery System
【24h】

The Taser Intrusion Recovery System

机译:Taser入侵恢复系统

获取原文
获取原文并翻译 | 示例
           

摘要

Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we argue that next generation systems should be built with automated intrusion recovery as a primary goal. In this paper, we describe the design of Taser, a system that helps in selectively recovering legitimate file-system data after an attack or local damage occurs. Taser reverts tainted, i.e. attack-dependent, file-system operations but preserves legitimate operations. This process is difficult for two reasons. First, the set of tainted operations is not known precisely. Second, the recovery process can cause conflicts when legitimate operations depend on tainted operations. Taser provides several analysis policies that aid in determining the set of tainted operations. To handle conflicts, Taser uses automated resolution policies that isolate the tainted operations. Our evaluation shows that Taser is effective in recovering from a wide range of intrusions as well as damage caused by system management errors.
机译:从入侵中恢复通常是当前系统中非常耗时的操作。在人力资源成本主导计算资源成本的时候,我们认为应该以自动入侵恢复为主要目标来构建下一代系统。在本文中,我们描述了Taser的设计,该系统有助于在发生攻击或本地破坏后有选择地恢复合法的文件系统数据。 Taser恢复受污染的(即与攻击有关的文件系统操作),但保留合法的操作。此过程很困难,原因有两个。首先,这套污染操作尚不清楚。其次,当合法操作依赖于受污染的操作时,恢复过程可能导致冲突。 Taser提供了多种分析策略,可帮助确定受污染的作业集。为了处理冲突,Taser使用自动解决策略来隔离受污染的操作。我们的评估表明,Taser可有效地从各种入侵以及由于系统管理错误引起的损害中恢复。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号