Pushing boulders uphill: the difficulty of network intrusion recovery

  • Authors:
  • Michael E. Locasto;Matthew Burnside;Darrell Bethea

  • Affiliations:
  • George Mason University;Columbia University;UNC, Chapel Hill

  • Venue:
  • LISA'09 Proceedings of the 23rd conference on Large installation system administration
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. We present a study of three significant compromises of a medium-scale network infrastructure. We do so as a way to expose the difficulties -- both technical and human -- inherent in intrusion recovery. Most network users take a "secure" network infrastructure for granted. Real events show that this level of faith is unwarranted, as is the belief that intrusions are or can be completely repaired, especially in the absence of research on network recovery mechanisms that explicitly take the needs of support staff into account. We conclude with lessons learned and some detailed suggestions for tools that can help bridge this gap.