Towards an approach for automatically repairing compromised network systems
The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that re...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 392 |
---|---|
container_issue | |
container_start_page | 389 |
container_title | |
container_volume | |
creator | Grizzard, J.B. Krasser, S. Owen, H.L. Conti, G.J. Dodson, E.R. |
description | The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that resides in an isolated area on the system. We use a virtual machine approach to isolate the repair agent. The repair agent should roll back any undesirable changes, determine the point of entry, and prevent further compromise. |
doi_str_mv | 10.1109/NCA.2004.1347806 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1347806</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1347806</ieee_id><sourcerecordid>1347806</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ddc143cf1d216968002d601141012c064e393585ca9b2318b9ebfe98051972f33</originalsourceid><addsrcrecordid>eNotj81KxDAYRQMiKGP3gpu8QOv35a_Ncij-4aCbcT2kSarRtilJZejbO-CczdkcLlxCbhEqRND3b-22YgCiQi7qBtQFKfTJtdKSMcHkFSly_oYTXEul9DV53cejSS5TM1Ezzyka-0X7mKj5XeJolmDNMKw0-dmEFKZPauN4qsaQvaOTX44x_dC85sWP-YZc9mbIvjh7Qz4eH_btc7l7f3ppt7syYC2X0jmLgtseHUOlVQPAnAJEgYDMghKeay4baY3uGMem077rvW5Aoq5Zz_mG3P3vBu_9YU5hNGk9nC_zP2wKTAk</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Towards an approach for automatically repairing compromised network systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Grizzard, J.B. ; Krasser, S. ; Owen, H.L. ; Conti, G.J. ; Dodson, E.R.</creator><creatorcontrib>Grizzard, J.B. ; Krasser, S. ; Owen, H.L. ; Conti, G.J. ; Dodson, E.R.</creatorcontrib><description>The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that resides in an isolated area on the system. We use a virtual machine approach to isolate the repair agent. The repair agent should roll back any undesirable changes, determine the point of entry, and prevent further compromise.</description><identifier>ISBN: 9780769522425</identifier><identifier>ISBN: 0769522424</identifier><identifier>DOI: 10.1109/NCA.2004.1347806</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Computer applications ; Computer errors ; Computer networks ; Educational institutions ; Hardware ; Humans ; Kernel ; Operating systems ; Virtual machining</subject><ispartof>Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings, 2004, p.389-392</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1347806$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1347806$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Grizzard, J.B.</creatorcontrib><creatorcontrib>Krasser, S.</creatorcontrib><creatorcontrib>Owen, H.L.</creatorcontrib><creatorcontrib>Conti, G.J.</creatorcontrib><creatorcontrib>Dodson, E.R.</creatorcontrib><title>Towards an approach for automatically repairing compromised network systems</title><title>Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings</title><addtitle>NCA</addtitle><description>The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that resides in an isolated area on the system. We use a virtual machine approach to isolate the repair agent. The repair agent should roll back any undesirable changes, determine the point of entry, and prevent further compromise.</description><subject>Application software</subject><subject>Computer applications</subject><subject>Computer errors</subject><subject>Computer networks</subject><subject>Educational institutions</subject><subject>Hardware</subject><subject>Humans</subject><subject>Kernel</subject><subject>Operating systems</subject><subject>Virtual machining</subject><isbn>9780769522425</isbn><isbn>0769522424</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAYRQMiKGP3gpu8QOv35a_Ncij-4aCbcT2kSarRtilJZejbO-CczdkcLlxCbhEqRND3b-22YgCiQi7qBtQFKfTJtdKSMcHkFSly_oYTXEul9DV53cejSS5TM1Ezzyka-0X7mKj5XeJolmDNMKw0-dmEFKZPauN4qsaQvaOTX44x_dC85sWP-YZc9mbIvjh7Qz4eH_btc7l7f3ppt7syYC2X0jmLgtseHUOlVQPAnAJEgYDMghKeay4baY3uGMem077rvW5Aoq5Zz_mG3P3vBu_9YU5hNGk9nC_zP2wKTAk</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Grizzard, J.B.</creator><creator>Krasser, S.</creator><creator>Owen, H.L.</creator><creator>Conti, G.J.</creator><creator>Dodson, E.R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>Towards an approach for automatically repairing compromised network systems</title><author>Grizzard, J.B. ; Krasser, S. ; Owen, H.L. ; Conti, G.J. ; Dodson, E.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ddc143cf1d216968002d601141012c064e393585ca9b2318b9ebfe98051972f33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Application software</topic><topic>Computer applications</topic><topic>Computer errors</topic><topic>Computer networks</topic><topic>Educational institutions</topic><topic>Hardware</topic><topic>Humans</topic><topic>Kernel</topic><topic>Operating systems</topic><topic>Virtual machining</topic><toplevel>online_resources</toplevel><creatorcontrib>Grizzard, J.B.</creatorcontrib><creatorcontrib>Krasser, S.</creatorcontrib><creatorcontrib>Owen, H.L.</creatorcontrib><creatorcontrib>Conti, G.J.</creatorcontrib><creatorcontrib>Dodson, E.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Grizzard, J.B.</au><au>Krasser, S.</au><au>Owen, H.L.</au><au>Conti, G.J.</au><au>Dodson, E.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Towards an approach for automatically repairing compromised network systems</atitle><btitle>Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings</btitle><stitle>NCA</stitle><date>2004</date><risdate>2004</risdate><spage>389</spage><epage>392</epage><pages>389-392</pages><isbn>9780769522425</isbn><isbn>0769522424</isbn><abstract>The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that resides in an isolated area on the system. We use a virtual machine approach to isolate the repair agent. The repair agent should roll back any undesirable changes, determine the point of entry, and prevent further compromise.</abstract><pub>IEEE</pub><doi>10.1109/NCA.2004.1347806</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769522425 |
ispartof | Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings, 2004, p.389-392 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1347806 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Computer applications Computer errors Computer networks Educational institutions Hardware Humans Kernel Operating systems Virtual machining |
title | Towards an approach for automatically repairing compromised network systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T21%3A43%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Towards%20an%20approach%20for%20automatically%20repairing%20compromised%20network%20systems&rft.btitle=Third%20IEEE%20International%20Symposium%20on%20Network%20Computing%20and%20Applications,%202004.%20(NCA%202004).%20Proceedings&rft.au=Grizzard,%20J.B.&rft.date=2004&rft.spage=389&rft.epage=392&rft.pages=389-392&rft.isbn=9780769522425&rft.isbn_list=0769522424&rft_id=info:doi/10.1109/NCA.2004.1347806&rft_dat=%3Cieee_6IE%3E1347806%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1347806&rfr_iscdi=true |