Title
The implementation and evaluation of a recovery system for workflows
Abstract
Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Moreover, legitimate tasks referring to the incorrect data will further corrupt more data objects in the system. As a result, the integrity level of the system can be seriously compromised. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks and automatically repairs the damages based on data and control dependencies between workflow tasks. We describe fundamental theories for workflow attack recovery system. Based on these theories, we build a prototype system and develop the corresponding recovery algorithms. We evaluate the performance of the recovery system under different attacking densities, intrusion detection delays and arrival rates. The experimental results show that our system is practical.
Year
DOI
Venue
2009
10.1016/j.jnca.2008.03.007
J. Network and Computer Applications
Keywords
DocType
Volume
on-line attack recovery,prototype system,data object,workflow management system,Workflow system,corresponding recovery algorithm,malicious task,recovery system,workflow attack recovery system,incorrect data
Journal
32
Issue
ISSN
Citations 
1
Journal of Network and Computer Applications
5
PageRank 
References 
Authors
0.53
32
3
Name
Order
Citations
PageRank
Meng Yu152466.52
Peng Liu21701171.49
Wanyu Zang319321.20