The Time Machine: Smart operation-resilience in presence of attacks and failures

被引:0
|
作者
Sayed, Muhammad Magdy [1 ]
Azab, Mohamed [2 ,3 ]
机构
[1] Alexandria Univ, Dept Comp & Commun Engn, Alexandria, Egypt
[2] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA 24450 USA
[3] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
关键词
Cloud computing; Linux container; Container security; Intrusion detection; System call monitoring; Logic bomb detection;
D O I
10.1109/iemcon.2019.8936284
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logic bomb are hidden code lines intentionally added to the source code to enable input-triggered activation of a wide list of malicious features. Bombs have been used for decades and considered as the most dangerous kind of attacks. Detecting such bombs in large software modules is a very complicated if not an impossible task. In this paper, we present the Time Machine (TM). TM is a software management framework built to protect containerized software modules from such bombs. TM enables cloned containers to act in a time-delayed controlled environment to detect and circumvent activation events from triggering such bombs. TM relies on a smart "Bag of System Calls" monitoring module to detect even slight changes in the targeted software module behavior as an indication of bomb activation. In response, TM blocks the triggering event from reaching the clones, quarantine the bomb-activated module, use the clone as a replacement, and alert the system admin. Results showed that TM managed to protect such modules from undetectable bombs, with negligible impact on the module performance.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [1] Resilience in Smart City Applications: Faults, Failures, and Solutions
    Shamsi, Jawwad. A.
    IT PROFESSIONAL, 2020, 22 (06) : 74 - 81
  • [2] Resilience of LTE Networks Against Smart Jamming Attacks
    Aziz, Farhan M.
    Shamma, Jeff S.
    Stueber, Gordon L.
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 734 - 739
  • [3] Progressive Switching Attacks for Instigating Cascading Failures in Smart Grid
    Liu, Shan
    Chen, Bo
    Kundur, Deepa
    Zourntos, Takis
    Butler-Purry, Karen
    2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [4] Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks
    Ruj, Sushmita
    Pal, Arindam
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 226 - 233
  • [5] Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures
    An, Hyok
    Na, Yoonjong
    Lee, Heejo
    Perrig, Adrian
    ELECTRONICS, 2021, 10 (11)
  • [6] IMPROVING RESILIENCE OF COMPLEX NETWORKS FACING ATTACKS AND FAILURES THROUGH ADAPTIVE MECHANISMS
    Ghedini, Cinara G.
    Ribeiro, Carlos H. C.
    ADVANCES IN COMPLEX SYSTEMS, 2014, 17 (02):
  • [7] QoE Fairness and Resilience Strategies for Access Point Failures in Smart Greenhouses
    Humaish, Mohammed A. Ba
    Refaat, Tarek K.
    Amer, Hassanein H.
    Cico, Betim
    2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 516 - 520
  • [8] The Operation Problem of Smart Vending Machine Systems
    Park, Yang-Byung
    Yoo, Jun-Su
    PROCEEDINGS OF 2ND CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCE (LISS 2012), VOLS 1 AND 2, 2013,
  • [9] Smart vending machine systems: operation and performance
    Park, Yang-Byung
    Park, Hae-Soo
    EUROPEAN JOURNAL OF INDUSTRIAL ENGINEERING, 2015, 9 (04) : 409 - 431
  • [10] Dynamical Failures Driven by False Load Injection Attacks Against Smart Grid
    Peng, Da-Tian
    Dong, Jianmin
    Yang, Jungang
    Peng, Qinke
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2213 - 2226