2003 International Conference on Dependable Systems and Networks, 2003. Proceedings.
DOI: 10.1109/dsn.2003.1209932
|View full text |Cite
|
Sign up to set email alerts
|

Design, implementation, and evaluation of repairable file service

Abstract: The data contents of an information system may be corrupted due to security breaches or human errors. This project focuses on intrusion tolerance techniques that speed up the process of repairing a damaged file system. The proposed system, called Repairable File Service (or RFS), is specifically designed to facilitate the repair of compromised network file servers. An architectural innovation of RFS is that it is decoupled from and requires no modifications on the shared file server that is being protected. RF… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…It can help administrators to find intrusion steps with the help of the dependency graph that is generated by logging and analyzing OS events. Zhu and Chiueh built a repairable file service named RFS [11] , which supports kernel logging to allow roll-back of any file update operation, and keeps track of inter-process dependencies to quickly determine the extent of system damage after an attack/error. In 2005, Ashvin Goel and Kenneth Po built an intrusion recovery system named taser [12] , which helps in selectively recovering file-system data after an attack.…”
Section: Remote-usermentioning
confidence: 99%
“…It can help administrators to find intrusion steps with the help of the dependency graph that is generated by logging and analyzing OS events. Zhu and Chiueh built a repairable file service named RFS [11] , which supports kernel logging to allow roll-back of any file update operation, and keeps track of inter-process dependencies to quickly determine the extent of system damage after an attack/error. In 2005, Ashvin Goel and Kenneth Po built an intrusion recovery system named taser [12] , which helps in selectively recovering file-system data after an attack.…”
Section: Remote-usermentioning
confidence: 99%
“…Zhu & Chiueh [70] implementou um sistemas de arquivos com suporte a este tipo de recuperação, permitindo ao usuário recuperar o estado dos arquivos para uma data anterior. Para isto criaram um sistema de log detalhado de qualquer operação de escrita no sistema de arquivos, isto faz com que qualquer operação deste tipo seja reversível.…”
Section: Recuperação Por Retornounclassified
“…Consiste em manter árvores de versões para cada arquivo, em para cada versão existem detalhes da transação feita para armazenar somente a diferença entre elas, o que permite uma recuperação eficiente e elegante. O sistema de Zhu & Chiueh [70] pode ser considerado um método de versionamento também, porém não guarda as operações baseando-se no conteúdo de cada arquivo, seu método analisa as operações no nível de bloco, desconsiderando qual arquivo está sendo manipulado na operação.…”
Section: Versionamentounclassified