The Community for Technology Leaders
Computer Security Applications Conference, Annual (2003)
Las Vegas, Nevada
Dec. 8, 2003 to Dec. 12, 2003
ISSN: 1063-9527
ISBN: 0-7692-2041-3
pp: 142
Meng Yu , Pennsylvania State University
Peng Liu , Pennsylvania State University
Wanyu Zang , Pennsylvania State University
Workflow systems are popular in daily business processing. Since vulnerabilities cannot be totally removed from a system, recovery from successful attacks is unavoidable. In this paper, we focus on attacks that inject malicious tasks into workflow management systems. We introduce practical techniques for on-line attack recovery, which include rules for locating damage and rules for execution order. In our system, an independent Intrusion Detection System reports identified malicious tasks periodically. The recovery system detects all damage caused by the malicious tasks and automatically repairs the damage according to dependency relations. Without multiple versions of data objects, recovery tasks may be corrupted by executing normal tasks when we try to run damage analysis and normal tasks concurrently. This paper addresses the problem by introducing multi-version data objects to reduce unnecessary blocking of normal task execution and improve the performance of the whole system. We analyze the integrity level and performance of our system. The analytic results demonstrate guidelines for designing such kinds of systems.

W. Zang, P. Liu and M. Yu, "Multi-Version Attack Recovery for Workflow Systems," Computer Security Applications Conference, Annual(ACSAC), Las Vegas, Nevada, 2003, pp. 142.
96 ms
(Ver 3.3 (11022016))