As Russia's ongoing economic restructuring over the past twenty years has revealed, Russia's exchange mechanism departs from that of an ideally standard market economy. To a large extent, the problem can be traced b...As Russia's ongoing economic restructuring over the past twenty years has revealed, Russia's exchange mechanism departs from that of an ideally standard market economy. To a large extent, the problem can be traced back to the "power-property" system established by Ivan IIL That is to say, the possession of power is equivalent to the possession of property, and property becomes certain functions of power. For a long time, this system has been accepted as a natural state of society by the Russian people. Rapid economic growth under the Putin administration is characterized by the return to and strengthening of a "power- property "system dominated by the state and an abandonment of "institutional transplantation" from the Western liberal market economic model in the Yeltsin era under which power and property were separated Mr. Putin's reelection in 2012 means that the "long-Putin era" that started from 2000 will last at least until 2018. However, with the solidification of the "power- property" system, the Putin administration has been confronted with new challenges, and the prospects for Russia's economic modernization still face great uncertainties.展开更多
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ...APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.展开更多
文摘As Russia's ongoing economic restructuring over the past twenty years has revealed, Russia's exchange mechanism departs from that of an ideally standard market economy. To a large extent, the problem can be traced back to the "power-property" system established by Ivan IIL That is to say, the possession of power is equivalent to the possession of property, and property becomes certain functions of power. For a long time, this system has been accepted as a natural state of society by the Russian people. Rapid economic growth under the Putin administration is characterized by the return to and strengthening of a "power- property "system dominated by the state and an abandonment of "institutional transplantation" from the Western liberal market economic model in the Yeltsin era under which power and property were separated Mr. Putin's reelection in 2012 means that the "long-Putin era" that started from 2000 will last at least until 2018. However, with the solidification of the "power- property" system, the Putin administration has been confronted with new challenges, and the prospects for Russia's economic modernization still face great uncertainties.
基金partially supported by the NSFC-General Technology Basic Research Joint Fund (U1536204)the National Key Technologies R&D Program (2014BAH41B00)+3 种基金the National Nature Science Foundation of China (61672394 61373168 61373169)the National High-tech R&D Program of China (863 Program) (2015AA016004)
文摘APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.