Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2008, Vol. 26 ›› Issue (6): 792-801.DOI: 10.7523/j.issn.2095-6134.2008.6.011

• 论文 • Previous Articles     Next Articles

A model of efficient intrusion recovery solution based on log-structured file system

WEN Xiao-Yang †, JING Ji-Wu1, LIU Peng2   

  1. 1 State Key Laboratory of Information Security, Graduate University of the Chinese Academy of Sciences, Beijing 100049, China; 2 College of Information Sciences and Technology, Pennsylvania State University, PA 16802, USA
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-11-15

Abstract: Data content stored in computer systems are more crucial than ever before. Compromised computer systems always suffer from data contaminations in both system and user files, therefore intrusion recovery methods are indispensable today. Existing intrusion recovery methods have shortcomings in certain aspects because, in our observation, the file systems on which these methods work are not inherently apt to realize recovery. In contrast, Log-Structured File System (LFS) is ideal to perform various intrusion recovery algorithms. We explain our claims theoretically, propose data recovery algorithm, validate it in SimuLFS, the LFS simulator we built, and test it in real LFS environment in FreeBSD. Experiment results indicate that even very simple recovery algorithm can achieve fast file recovery from almost any state of the disk, with little throughput degradation, guarantee accuracy, require no extra storage requirements and minimal changes to any original LFS code.

Key words: log structured file system, data recovery, self-healing