Defensive execution of transactional processes against attacks

Meng Yu, Wanyu Zang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.

Original languageEnglish (US)
Title of host publicationProceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
Pages515-524
Number of pages10
DOIs
StatePublished - Dec 1 2005
Event21st Annual Computer Security Applications Conference, ACSAC 2005 - Tucson, AZ, United States
Duration: Dec 5 2005Dec 9 2005

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
Volume2005
ISSN (Print)1063-9527

Other

Other21st Annual Computer Security Applications Conference, ACSAC 2005
CountryUnited States
CityTucson, AZ
Period12/5/0512/9/05

Fingerprint

Recovery
Markov processes
Availability
Processing
Costs

All Science Journal Classification (ASJC) codes

  • Software
  • Engineering(all)

Cite this

Yu, M., Zang, W., & Liu, P. (2005). Defensive execution of transactional processes against attacks. In Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005 (pp. 515-524). [1565278] (Proceedings - Annual Computer Security Applications Conference, ACSAC; Vol. 2005). https://doi.org/10.1109/CSAC.2005.18
Yu, Meng ; Zang, Wanyu ; Liu, Peng. / Defensive execution of transactional processes against attacks. Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. 2005. pp. 515-524 (Proceedings - Annual Computer Security Applications Conference, ACSAC).
@inproceedings{d5aa88b1c9cf423cac41c4522122bc5e,
title = "Defensive execution of transactional processes against attacks",
abstract = "It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.",
author = "Meng Yu and Wanyu Zang and Peng Liu",
year = "2005",
month = "12",
day = "1",
doi = "10.1109/CSAC.2005.18",
language = "English (US)",
isbn = "0769524613",
series = "Proceedings - Annual Computer Security Applications Conference, ACSAC",
pages = "515--524",
booktitle = "Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005",

}

Yu, M, Zang, W & Liu, P 2005, Defensive execution of transactional processes against attacks. in Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005., 1565278, Proceedings - Annual Computer Security Applications Conference, ACSAC, vol. 2005, pp. 515-524, 21st Annual Computer Security Applications Conference, ACSAC 2005, Tucson, AZ, United States, 12/5/05. https://doi.org/10.1109/CSAC.2005.18

Defensive execution of transactional processes against attacks. / Yu, Meng; Zang, Wanyu; Liu, Peng.

Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. 2005. p. 515-524 1565278 (Proceedings - Annual Computer Security Applications Conference, ACSAC; Vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Defensive execution of transactional processes against attacks

AU - Yu, Meng

AU - Zang, Wanyu

AU - Liu, Peng

PY - 2005/12/1

Y1 - 2005/12/1

N2 - It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.

AB - It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.

UR - http://www.scopus.com/inward/record.url?scp=33846283102&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33846283102&partnerID=8YFLogxK

U2 - 10.1109/CSAC.2005.18

DO - 10.1109/CSAC.2005.18

M3 - Conference contribution

SN - 0769524613

SN - 9780769524610

T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC

SP - 515

EP - 524

BT - Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005

ER -

Yu M, Zang W, Liu P. Defensive execution of transactional processes against attacks. In Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. 2005. p. 515-524. 1565278. (Proceedings - Annual Computer Security Applications Conference, ACSAC). https://doi.org/10.1109/CSAC.2005.18