Intrusion Recovery Using Selective Re-execution
نویسندگان
چکیده
RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary’s changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an action history graph, which is a detailed dependency graph describing the system’s execution. RETRO uses refinement to describe graph objects and actions at multiple levels of abstraction, which allows for precise dependencies. During repair, RETRO uses the action history graph to undo an unwanted action and its indirect effects by first rolling back its direct effects, and then re-executing legitimate actions that were influenced by that change. To minimize user involvement and re-execution, RETRO uses predicates to selectively re-execute only actions that were semantically affected by the adversary’s changes, and uses compensating actions to handle external effects. An evaluation of a prototype of RETRO for Linux with 2 real-world attacks, 2 synthesized challenge attacks, and 6 attacks from previous work, shows that RETRO can often repair the system without user involvement, and avoids false positives and negatives from previous solutions. These benefits come at the cost of 35–127% in execution time overhead and of 4–150 GB of log space per day, depending on the workload. For example, a HotCRP paper submission web site incurs 35% slowdown and generates 4 GB of logs per day under the workload from 30 minutes prior to the SOSP 2007 deadline.
منابع مشابه
Project Proposal
Currently, intrusion analysis and recovery is a manual and tedious process. There have been several attempts at expediting the operation by automating some aspects of the process. Taser intrusion recovery is one such system. It logs system calls and is able to derive a dependency tree of kernel objects which aids in determining the list of files tainted by an intruder or software misconfigurati...
متن کاملPreliminary Study of Trace - Cache - Based Control Independence Architecture
AL-OTOOM, MUAWYA MOHAMED. Preliminary Study of Trace-Cache-Based Control Independence Architecture. (Under the direction of Dr. Eric Rotenberg.) Conventional superscalar processors recover from a mispredicted branch by squashing all instructions after the branch. While simple, this approach needlessly re-executes many future control-independent (CI) instructions after the branch's reconvergent ...
متن کاملMulti-Version Attack Recovery for Workflow Systems
Workflow systems are popular in daily business processing. Since vulnerabilities cannot be totally removed from a system, recovery from successful attacks is unavoidable. In this paper, we focus on attacks that inject malicious tasks into workflow management systems. We introduce practical techniques for on-line attack recovery, which include rules for locating damage and rules for execution or...
متن کاملEnvironment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy of our models with a new dataflow analysis algo...
متن کاملThe Glasshouse - A Reflective Container for Mobile Code
Mobile code has become mainstream, Java’s applets provide a familiar example. Other examples, where the code may be loaded from a local store but may have been provided by a third party, are Enterprise Java Beans [1] and Microsoft’s COM [2]. Here, components execute within a container that provides services to the component. This container and component programming model is very similar to mobi...
متن کامل