Defensive execution of transactional processes against attacks

Meng Yu, Wanyu Zang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.

Original languageEnglish (US)
Title of host publicationProceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
PublisherIEEE Computer Society
Pages517-526
Number of pages10
ISBN (Print)0769524613, 9780769524610
DOIs
StatePublished - 2005
Event21st Annual Computer Security Applications Conference, ACSAC 2005 - Tucson, AZ, United States
Duration: Dec 5 2005Dec 9 2005

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
Volume2005
ISSN (Print)1063-9527

Other

Other21st Annual Computer Security Applications Conference, ACSAC 2005
CountryUnited States
CityTucson, AZ
Period12/5/0512/9/05

All Science Journal Classification (ASJC) codes

  • Software
  • Engineering(all)

Fingerprint Dive into the research topics of 'Defensive execution of transactional processes against attacks'. Together they form a unique fingerprint.

  • Cite this

    Yu, M., Zang, W., & Liu, P. (2005). Defensive execution of transactional processes against attacks. In Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005 (pp. 517-526). [1565278] (Proceedings - Annual Computer Security Applications Conference, ACSAC; Vol. 2005). IEEE Computer Society. https://doi.org/10.1109/CSAC.2005.18