Multi-version attack recovery for workflow systems

被引:0
作者
Yu, M [1 ]
Liu, P [1 ]
Zang, WY [1 ]
机构
[1] Penn State Univ, Sch Informat Sci & Technol, University Pk, PA 16801 USA
来源
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 2003年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Workflow systems are popular in daily business processing. Since vulnerabilities cannot be totally removed from a system, recovery from successful attacks is unavoidable. In this paper, we focus on attacks that inject malicious tasks into workflow management systems. We introduce practical techniques for on-line attack recovery, which include rules for locating damage and rules for execution order In our system, an independent Intrusion Detection System reports identified malicious tasks periodically. The recovery system detects all damage caused by the malicious tasks and automatically repairs the damage according to dependency relations. Without multiple versions of data objects, recovery tasks may be corrupted by executing normal tasks when we try to run damage analysis and normal tasks concurrently. This paper addresses the problem by introducing multi-version data objects to reduce unnecessary blocking of normal task execution and improve the performance of the whole system. We analyze the integrity level and performance of our system. The analytic results demonstrate guidelines for designing such kinds of systems.
引用
收藏
页码:142 / 151
页数:10
相关论文
共 15 条
[1]  
Ammann Paul, 2002, IEEE T KNOWLEDGE DAT
[2]  
Atluri V., 2001, P CCS PHIL PA USA, P48, DOI 10.1145/501983.501991
[3]   Failure handling for transaction hierarchies [J].
Chen, QM ;
Dayal, U .
13TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING - PROCEEDINGS, 1997, :245-254
[4]  
EDER J, 1996, C COOP INF SYST, P124
[5]   A survey of rollback-recovery protocols in message-passing systems [J].
Elnozahy, EN ;
Alvisi, L ;
Wang, YM ;
Johnson, DB .
ACM COMPUTING SURVEYS, 2002, 34 (03) :375-408
[6]  
JEFFERSON DR, 1985, ACM T PROGR LANG SYS, V7, P404, DOI 10.1145/3916.3988
[7]  
Kroese D. R., 2002, ACM Transactions on Modeling and Computer Simulation, V12, P119, DOI 10.1145/566392.566395
[8]  
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[9]   A low-cost checkpointing technique for distributed databases [J].
Lin, JL ;
Dunham, MH .
DISTRIBUTED AND PARALLEL DATABASES, 2001, 10 (03) :241-268
[10]   A survey of distributed database checkpointing [J].
Lin, JL ;
Dunham, MH ;
Nascimento, MA .
DISTRIBUTED AND PARALLEL DATABASES, 1997, 5 (03) :289-319