Carnegie Mellon University
file.pdf (120.53 kB)
Download file

Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage (CMU-CS-02-140)

Download (120.53 kB)
journal contribution
posted on 2002-05-01, 00:00 authored by John D. Strunk, Garth R. Goodson, Adam G. Pennington, Craig A.N. Soules, Gregory R. Ganger
Self-securing storage turns storage devices into active parts of an intrusion survival strategy. From behind a thin storage interface (e.g., SCSI or CIFS), a self-securing storage server can watch storage requests, keep a record of all storage activity, and prevent compromised clients from destroying stored data. This paper describes three ways self-securing storage enhances an administrator’s ability to detect, diagnose, and recover from client system intrusions. First, storage-based intrusion detection offers a new observation point for noticing suspect activity. Second, post-hoc intrusion diagnosis starts with a plethora of normally-unavailable information. Finally, post-intrusion recovery is reduced to restarting the system with a pre-intrusion storage image retained by the server. Combined, these features can improve an organization’s ability to survive successful digital intrusions.


Publisher Statement

All Rights Reserved



Usage metrics