Recovery from malicious transactions

被引:66
作者
Ammann, P [1 ]
Jajodia, S
Liu, P
机构
[1] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[2] Penn State Univ, Sch Informat Sci & Technol, University Pk, PA 16802 USA
关键词
security; database recovery; transaction processing; assurance;
D O I
10.1109/TKDE.2002.1033782
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare, perspective, which assumes success by the attacker in achieving partial, but not complete, damage. In particular, we work in the database context and consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Recovery is complicated by the presence of benign transactions that depend, directly or indirectly, on the malicious transactions. We present algorithms to restore only the damaged part of the database. We identify the information that needs to be maintained for such algorithms. The initial algorithms repair damage to quiescent databases; subsequent algorithms increase availability by allowing new transactions to execute concurrently with the repair process. Also, via a study of benchmarks, we show practical examples of how off line analysis can efficiently provide the necessary data to repair the damage of malicious transactions.
引用
收藏
页码:1167 / 1185
页数:19
相关论文
共 36 条
[1]  
ADAMS MR, 1989, ACM COMPUTING SURVEY, V21
[2]  
AJODIA S, 1997, P AC SIGMOD INT C MA, P474
[3]   Surviving information warfare attacks on databases [J].
Ammann, P ;
Jajodia, S ;
McCollum, CD ;
Blaustein, BT .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :164-174
[4]   ON-THE-FLY READING OF ENTIRE DATABASES [J].
AMMANN, P ;
JAJODIA, S ;
MAVULURI, P .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1995, 7 (05) :834-838
[5]  
ATLURI V, 1999, MULTILEVEL SECURE T
[6]  
BARBARA D, 2000, P 2000 INT C EXT DAT
[7]  
Bernstein P.A., 1987, Concurrency Control and Recovery in Database Systems
[8]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[9]  
ELIOT J, 1985, NESTED T APPROC RELI
[10]  
Garcia-Molina H., 1987, P ACM SIGMOD INT C M, P249, DOI DOI 10.1145/38714.38742