Self-healing workflow systems under attacks

Meng Yu, Peng Liu, Wanyu Zang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Abstract

Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks that the intrusion detection system reports and automatically repairs the damages based on data and control dependencies among workflow tasks. We analyze the behaviors of our attack recovery system based on the Continuous Time Markov Chain model. The analytical results demonstrate that our system is practical when the parameters of the system are reasonably designed.

Original languageEnglish (US)
Title of host publicationProceedings - 24th International Conference on Distributed Computing Systems
Pages418-425
Number of pages8
Volume24
StatePublished - 2004
EventProceedings - 24th International Conference on Distributed Computing Systems - Hachioji, Tokyo, Japan
Duration: Mar 24 2004Mar 26 2004

Other

OtherProceedings - 24th International Conference on Distributed Computing Systems
CountryJapan
CityHachioji, Tokyo
Period3/24/043/26/04

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Self-healing workflow systems under attacks'. Together they form a unique fingerprint.

Cite this