The implementation and evaluation of a recovery system for workflows

  • Authors:
  • Meng Yu;Peng Liu;Wanyu Zang

  • Affiliations:
  • Department of Computer Science, Western Illinois University, 1 University Drive, Macomb, IL 61455, USA;School of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802, USA;Department of Computer Science, Western Illinois University, 1 University Drive, Macomb, IL 61455, USA

  • Venue:
  • Journal of Network and Computer Applications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Workflow systems are popular in daily business processing. Since vulnerability cannot be totally removed from a workflow management system, successful attacks always happen and may inject malicious tasks or incorrect data into the workflow system. Moreover, legitimate tasks referring to the incorrect data will further corrupt more data objects in the system. As a result, the integrity level of the system can be seriously compromised. This problem cannot be efficiently solved by existing defense mechanisms, such as access control, intrusion detection, and checkpoints. In this paper, we propose a practical solution for on-line attack recovery of workflows. The recovery system discovers all damages caused by the malicious tasks and automatically repairs the damages based on data and control dependencies between workflow tasks. We describe fundamental theories for workflow attack recovery system. Based on these theories, we build a prototype system and develop the corresponding recovery algorithms. We evaluate the performance of the recovery system under different attacking densities, intrusion detection delays and arrival rates. The experimental results show that our system is practical.