|
计算机应用 2008
Data-flow dependency-based trusted recovery method
|
Abstract:
To effectively recover system states under intrusion situation, an inter-process system recovery method based on data-flow dependency was presented. By real-time monitoring of system calls, abnormal behaviors were detected and damages of the protected system were evaluated. According to the evaluation, the system was recovered. Legal operations were preserved to improve the accuracy and efficiency of recovery. A prototype system was implemented by the method. Experimental results show that the method has be...