TY - GEN
T1 - Availability-sensitive intrusion recovery
AU - Zhang, Shengzhi
AU - Xiong, Xi
AU - Jia, Xiaoqi
AU - Liu, Peng
PY - 2009
Y1 - 2009
N2 - A system-wide comprehensive cleaning is the primary goal of intrusion recovery. However, the diversity of the vulnerabilities, the creativity of the attackers and the complexity of system contribute to the difficulty of 'sweeping the footprint' of attacks. In this paper, we propose a VM-based intrusion recovery architecture with more concerns on service availability and continuity. Integrating the state of art techniques such as backtracking, cross-layer damage assessment and heterogeneous VM migration, our system can comprehensively sweep out the footprint of intrusion while providing desired service availability and continuity.
AB - A system-wide comprehensive cleaning is the primary goal of intrusion recovery. However, the diversity of the vulnerabilities, the creativity of the attackers and the complexity of system contribute to the difficulty of 'sweeping the footprint' of attacks. In this paper, we propose a VM-based intrusion recovery architecture with more concerns on service availability and continuity. Integrating the state of art techniques such as backtracking, cross-layer damage assessment and heterogeneous VM migration, our system can comprehensively sweep out the footprint of intrusion while providing desired service availability and continuity.
UR - http://www.scopus.com/inward/record.url?scp=74049161880&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=74049161880&partnerID=8YFLogxK
U2 - 10.1145/1655148.1655156
DO - 10.1145/1655148.1655156
M3 - Conference contribution
AN - SCOPUS:74049161880
SN - 9781605587806
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 43
EP - 48
BT - Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
T2 - 1st ACM Workshop on Virtual Machine Security, VMSec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09
Y2 - 9 November 2009 through 13 November 2009
ER -