Cs seminar 20070426

238 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
238
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cs seminar 20070426

  1. 1. Title: Towards an Attack-Resistant DesktopWe propose a system intended to provide high availability through redundant systemcomponents and rapid recovery against viruses, worms, problematic system updates, andany other adverse system changes. Many systems are vulnerable because they do not runthe latest virus definitions or security patches and even systems that are fully patched aresusceptible to zero day attacks. Also, system or application updates can break othersoftware packages or cause the system to become unstable. Our approach uses four keytechniques: (1) isolate user data on a file system virtual machine and allow rollback if anattack has introduced modifications or corruption, (2) separate applications from each otherby running them in virtual machine appliances and allow rollback if an attack or systeminstability is detected, (3) use standard network-based intrusion detection systems to detectincoming attacks and also suspicious outgoing activity, and finally (4) add a novel approachto file system intrusion detection by creating application-specific data protection contracts.This talk will discuss the design of our system and suggest possible implementationstrategies.

×