Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems

12/14/2019
by   Ronny Chevalier, et al.
0

Despite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an orchestration of fine-grained recovery and per-service responses (e.g., privileges removal). Such an approach may put the system into a degraded mode. This degraded mode prevents attackers to reinfect the system or to achieve their goals if they managed to reinfect it. It maintains the availability of core functions while waiting for patches to be deployed. We devised a cost-sensitive response selection process to ensure that while the service is in a degraded mode, its core functions are still operating. We built a Linux-based prototype and evaluated the effectiveness of our approach against different types of intrusions. The results show that our solution removes the effects of the intrusions, that it can select appropriate responses, and that it allows services to survive when reinfected. In terms of performance overhead, in most cases, we observed a small overhead, except in the rare case of services that write many small files asynchronously in a burst, where we observed a higher but acceptable overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/27/2016

An Evaluation of Coarse-Grained Locking for Multicore Microkernels

The trade-off between coarse- and fine-grained locking is a well underst...
research
06/06/2022

CompartOS: CHERI Compartmentalization for Embedded Systems

Existing high-end embedded systems face frequent security attacks. Softw...
research
08/01/2023

SF-IDS: An Imbalanced Semi-Supervised Learning Framework for Fine-grained Intrusion Detection

Deep learning-based fine-grained network intrusion detection systems (NI...
research
04/17/2019

In Search of a Key Value Store with High Performance and High Availability

In recent year, the write-heavy applications is more and more prevalent....
research
10/29/2020

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Security architectures providing Trusted Execution Environments (TEEs) h...
research
12/28/2020

A Kubernetes Controller for Managing the Availability of Elastic Microservice Based Stateful Applications

The architectural style of microservices has been gaining popularity in ...
research
07/12/2023

Evaluating DNS Resiliency and Responsiveness with Truncation, Fragmentation DoTCP Fallback

Since its introduction in 1987, the DNS has become one of the core compo...

Please sign up or login with your details

Forgot password? Click here to reset