TY - GEN
T1 - Defensive execution of transactional processes against attacks
AU - Yu, Meng
AU - Zang, Wanyu
AU - Liu, Peng
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.
AB - It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the malicious transactions. Rolling back and re-executing damaged transactions increase the response time of the system and may cause a significant processing delay. In such situations, the availability of the system is compromised and the system suffers the vulnerability of Denial of Service (DoS). In this paper, we propose a defensive executing technique and analyze its effectiveness. Our technique concurrently executes multiple paths of a transactional processes based on the prediction generated by a Discrete Time Markov Chain. The defensive execution can reduce the delay caused by recovery. We also propose a branch cutting technique to reduce the extra cost introduced by defensive execution. Our analytical results show that our technique is practical against transactional level attacks.
UR - http://www.scopus.com/inward/record.url?scp=33846283102&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33846283102&partnerID=8YFLogxK
U2 - 10.1109/CSAC.2005.18
DO - 10.1109/CSAC.2005.18
M3 - Conference contribution
AN - SCOPUS:33846283102
SN - 0769524613
SN - 9780769524610
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 517
EP - 526
BT - Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
PB - IEEE Computer Society
T2 - 21st Annual Computer Security Applications Conference, ACSAC 2005
Y2 - 5 December 2005 through 9 December 2005
ER -