TY - GEN
T1 - XLRF
T2 - 15th International Conference on Information and Communications Security, ICICS 2013
AU - Yoon, Eunjung
AU - Liu, Peng
PY - 2013/12/1
Y1 - 2013/12/1
N2 - Recovering mission-critical systems from intrusion is very challenging, where fast and accurate damage assessment and recovery is vital to ensure business continuity. Existing intrusion recovery approaches mostly focus on a single abstraction layer. OS level recovery cannot fully meet the correctness criteria defined by business process semantics, while business workflow level recovery usually results in non-executable recovery plans. In this paper, we propose a cross-layer recovery framework, called XRLF, for fast and effective post-intrusion diagnosis and recovery of compromised systems using the dependencies captured at different levels of abstraction; business workflow level and OS level. The goal of our approach is two-fold: first, to bridge the semantic gap between workflow-level and system-level recovery, thus enable comprehensive intrusion analysis and recovery; second, to automate damage assessment and recovery plan generation, thus expedite the recovery process, an otherwise time-consuming and error-prone task.
AB - Recovering mission-critical systems from intrusion is very challenging, where fast and accurate damage assessment and recovery is vital to ensure business continuity. Existing intrusion recovery approaches mostly focus on a single abstraction layer. OS level recovery cannot fully meet the correctness criteria defined by business process semantics, while business workflow level recovery usually results in non-executable recovery plans. In this paper, we propose a cross-layer recovery framework, called XRLF, for fast and effective post-intrusion diagnosis and recovery of compromised systems using the dependencies captured at different levels of abstraction; business workflow level and OS level. The goal of our approach is two-fold: first, to bridge the semantic gap between workflow-level and system-level recovery, thus enable comprehensive intrusion analysis and recovery; second, to automate damage assessment and recovery plan generation, thus expedite the recovery process, an otherwise time-consuming and error-prone task.
UR - http://www.scopus.com/inward/record.url?scp=84893802258&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893802258&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-02726-5_15
DO - 10.1007/978-3-319-02726-5_15
M3 - Conference contribution
AN - SCOPUS:84893802258
SN - 9783319027258
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 194
EP - 212
BT - Information and Communications Security - 15th International Conference, ICICS 2013, Proceedings
Y2 - 20 November 2013 through 22 November 2013
ER -