The Time Machine: Smart operation-resilience in presence of attacks and failures

被引:0
|
作者
Sayed, Muhammad Magdy [1 ]
Azab, Mohamed [2 ,3 ]
机构
[1] Alexandria Univ, Dept Comp & Commun Engn, Alexandria, Egypt
[2] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA 24450 USA
[3] City Sci Res & Technol Applicat, Informat Res Inst, Alexandria, Egypt
关键词
Cloud computing; Linux container; Container security; Intrusion detection; System call monitoring; Logic bomb detection;
D O I
10.1109/iemcon.2019.8936284
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logic bomb are hidden code lines intentionally added to the source code to enable input-triggered activation of a wide list of malicious features. Bombs have been used for decades and considered as the most dangerous kind of attacks. Detecting such bombs in large software modules is a very complicated if not an impossible task. In this paper, we present the Time Machine (TM). TM is a software management framework built to protect containerized software modules from such bombs. TM enables cloned containers to act in a time-delayed controlled environment to detect and circumvent activation events from triggering such bombs. TM relies on a smart "Bag of System Calls" monitoring module to detect even slight changes in the targeted software module behavior as an indication of bomb activation. In response, TM blocks the triggering event from reaching the clones, quarantine the bomb-activated module, use the clone as a replacement, and alert the system admin. Results showed that TM managed to protect such modules from undetectable bombs, with negligible impact on the module performance.
引用
收藏
页码:127 / 132
页数:6
相关论文
共 50 条
  • [31] Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme
    Li, Beibei
    Lu, Rongxing
    Xiao, Gaoxi
    Li, Tao
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (04) : 2679 - 2692
  • [32] On the Reconfigurability of Time-Modulated Linear Arrays in the Presence of Failures
    Poli, Lorenzo
    Rocca, Paolo
    Oliveri, Giacomo
    Massa, Andrea
    2013 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM (APSURSI), 2013, : 860 - 861
  • [33] Time bounds for decision problems in the presence of timing uncertainty and failures
    Attiya, H
    Djerassi-Shintel, T
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2001, 61 (08) : 1096 - 1109
  • [34] A Framework For Effective Watermarking Synchronous With Time And Frequency Domain For Resilience To Attacks
    Shahabadkar, Ramesh
    Shahabadkar, Krutika Ramesh
    2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 193 - 198
  • [35] Predicting machine failures from industrial time series data
    Jansen, Femke
    Holenderski, Mike
    Ozcelebi, Tanir
    Dam, Paulien
    Tijsma, Bas
    2018 5TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), 2018, : 1091 - 1096
  • [36] A Comparative Evaluation of Machine Learning Architectures for Detecting Attacks on Smart Meter Data
    Gallego, Carlos J.
    Bernardos, Ana M.
    Casar, Jose R.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND AMBIENT INTELLIGENCE, UCAMI 2024, 2024, 1212 : 817 - 828
  • [37] Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
    Banescu, Sebastian
    Collberg, Christian
    Pretschner, Alexander
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 661 - 678
  • [38] Modeling Data Intrusion Attacks on Energy Storage for Vulnerability Assessment of Smart Microgrid Operation
    Arsoon, Milad Mehri
    Moghaddas-Tafreshi, Seyed Masoud
    2021 11TH SMART GRID CONFERENCE (SGC), 2021, : 215 - 219
  • [39] Resilience-oriented operation of microgrids in the presence of power-to-hydrogen systems
    Shahbazbegian, Vahid
    Shafie-Khah, Miadreza
    Laaksonen, Hannu
    Strbac, Goran
    Ameli, Hossein
    APPLIED ENERGY, 2023, 348
  • [40] Investigating machine learning attacks on financial time series models
    Gallagher, Michael
    Pitropakis, Nikolaos
    Chrysoulas, Christos
    Papadopoulos, Pavlos
    Mylonas, Alexios
    Katsikas, Sokratis
    COMPUTERS & SECURITY, 2022, 123