Abstract | ||
---|---|---|
Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Moreover, legitimate tasks referring to the incorrect data will further corrupt more data objects in the system. As a result, the integrity level of the system can be seriously compromised. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks and automatically repairs the damages based on data and control dependencies between workflow tasks. We describe fundamental theories for workflow attack recovery system. Based on these theories, we build a prototype system and develop the corresponding recovery algorithms. We evaluate the performance of the recovery system under different attacking densities, intrusion detection delays and arrival rates. The experimental results show that our system is practical. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1016/j.jnca.2008.03.007 | J. Network and Computer Applications |
Keywords | DocType | Volume |
on-line attack recovery,prototype system,data object,workflow management system,Workflow system,corresponding recovery algorithm,malicious task,recovery system,workflow attack recovery system,incorrect data | Journal | 32 |
Issue | ISSN | Citations |
1 | Journal of Network and Computer Applications | 5 |
PageRank | References | Authors |
0.53 | 32 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Meng Yu | 1 | 524 | 66.52 |
Peng Liu | 2 | 1701 | 171.49 |
Wanyu Zang | 3 | 193 | 21.20 |