Check nearby libraries
Buy this book

Recovery from intrusions is typically a very time-consuming and error-prone task because the precise details of an attack may not be known. The wide availability of attack toolkits that install modified utility programs and erase log files to hide an attack further complicates this problem. This thesis explores a fast and accurate method for determining intrusion activity for file-system recovery. Given an audit log of all system activities, our approach uses dependency analysis to determine the set of intrusion-related activities. This approach effectively detects all attack-related activities, but it can falsely mark legitimate activities as related to an intrusion. Hence, we propose various enhancements to improve the accuracy of the analysis. This approach is implemented as part of the Taser intrusion recovery system. Our evaluation shows that Taser is effective in recovering from the damage caused by a wide range of intrusions and system management errors.
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1 |
aaaa
|
Book Details
Edition Notes
Source: Masters Abstracts International, Volume: 44-02, page: 0942.
Thesis (M.A.Sc.)--University of Toronto, 2005.
Electronic version licensed for access by U. of T. users.
GERSTEIN MICROTEXT copy on microfiche (1 microfiche).
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created October 21, 2008
- 2 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
December 15, 2009 | Edited by WorkBot | link works |
October 21, 2008 | Created by ImportBot | Imported from University of Toronto MARC record |