Research Article
Trading Elephants for Ants: Efficient Post-attack Reconstitution
287 downloads
@INPROCEEDINGS{10.1007/978-3-642-31909-9_27, author={Meixing Le and Zhaohui Wang and Quan Jia and Angelos Stavrou and Anup Ghosh and Sushil Jajodia}, title={Trading Elephants for Ants: Efficient Post-attack Reconstitution}, proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={10}, keywords={Data Provenance Causal Dependency System Recovery}, doi={10.1007/978-3-642-31909-9_27} }
- Meixing Le
Zhaohui Wang
Quan Jia
Angelos Stavrou
Anup Ghosh
Sushil Jajodia
Year: 2012
Trading Elephants for Ants: Efficient Post-attack Reconstitution
SECURECOMM
Springer
DOI: 10.1007/978-3-642-31909-9_27
Abstract
While security has become a first-class consideration in systems’ design and operation, most of the commercial and research efforts have been focused on detection, prevention, and forensic analysis of attacks. Relatively little work has gone into efficient recovery of application and data after a compromise. Administrators and end-users are faced with the arduous task of cleansing the affected machines. Restoring the system using snapshot is disruptive and it can lead to data loss.
Copyright © 2011–2024 ICST