Abstract:
The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envi...Show MoreMetadata
Abstract:
The widely accepted method to repair a compromised system is to wipe the system clean and reinstall. We think that there may be alternative methods. Specifically, we envision systems that are capable of automatically recovering from system compromises. Our proposed approach is a repair agent that resides in an isolated area on the system. We use a virtual machine approach to isolate the repair agent. The repair agent should roll back any undesirable changes, determine the point of entry, and prevent further compromise.
Published in: Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings.
Date of Conference: 01-01 September 2004
Date Added to IEEE Xplore: 08 November 2004
Print ISBN:0-7695-2242-4