The Community for Technology Leaders
Computer Security Applications Conference, Annual (2005)
Tucson, Arizona
Dec. 5, 2005 to Dec. 9, 2005
ISSN: 1063-9527
ISBN: 0-7695-2461-3
pp: 515-526
Meng Yu , Monmouth University
Peng Liu , Pennsylvania State University
Wanyu Zang , Monmouth University
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.
Meng Yu, Peng Liu, Wanyu Zang, "Defensive Execution of Transactional Processes against Attacks", Computer Security Applications Conference, Annual, vol. 00, no. , pp. 515-526, 2005, doi:10.1109/CSAC.2005.18
204 ms
(Ver 3.1 (10032016))