DocumentCode :
1816320
Title :
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor
Author :
Shi, Weidong ; Lee, Hsien-Hsin S. ; Gu, Guofei ; Falk, Laura ; Mudge, Trevor N. ; Ghosh, Mrinmoy
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA
fYear :
2005
fDate :
13-16 June 2005
Firstpage :
263
Lastpage :
273
Abstract :
This paper proposes a novel system design using a chip multiprocessor (CMP) to provide intrusion tolerance and self-recovery for server applications. Our platform provides three major advantages over previously proposed approaches, 1) security insulation from remote exploits and attacks; 2) close coupling between processor cores in a CMP to ensure immediate logging, fine-grained inspection and fast recovery; 3) concurrent and fine-grained inspection, logging and recovery techniques that are off of the critical path. We have designed a multi-point defense and recovery system to defeat remote exploits. We used a checkpoint based approach to recover server applications under attack. It takes a snapshot of the application´s context and memory state before it handles the next request. If the request turns out to be malicious, the system can discard the malicious request and rollback the application´s state to a known good one through checkpointing. We have also designed an rapid recovery system for kernel space rootkit attacks. Our intrusion survivable and self-recovery design provides reliable production services that System Administrators are seeking
Keywords :
buffer storage; checkpointing; distributed processing; fault tolerant computing; microprocessor chips; operating system kernels; security of data; buffer overflow; intrusion tolerance; intrusion-tolerant computing; kernel space rootkit attacks; network service system; rapid recovery system; reliable production services; security enhanced chip multiprocessor; self recovery; server applications; survivable service; Buffer overflow; Computer security; Costs; Design engineering; Educational institutions; Humans; Inspection; Protection; Virtual machining; Virtual manufacturing; Intrusion-tolerant computing; buffer overflow.; chip multi processor; rootkits; self-healing; survivable service;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
0-7965-2276-9
Type :
conf
DOI :
10.1109/ICAC.2005.8
Filename :
1498070
Link To Document :
بازگشت