Recovery from malicious transactions
- 7 November 2002
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Knowledge and Data Engineering
- Vol. 14 (5), 1167-1185
- https://doi.org/10.1109/tkde.2002.1033782
Abstract
Preventive measures sometimes fail to deflect malicious attacks. We adopt an information warfare perspective, which assumes success by the attacker in achieving partial, but not complete, damage. In particular, we work in the database context and consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Recovery is complicated by the presence of benign transactions that depend, directly or indirectly, on the malicious transactions. We present algorithms to restore only the damaged part of the database. We identify the information that needs to be maintained for such algorithms. The initial algorithms repair damage to quiescent databases; subsequent algorithms increase availability by allowing new transactions to execute concurrently with the repair process. Also, via a study of benchmarks, we show practical examples of how offline analysis can efficiently provide the necessary data to repair the damage of malicious transactions.Keywords
This publication has 21 references indexed in Scilit:
- The SRI IDES statistical anomaly detectorPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The multilevel relational (MLR) data modelACM Transactions on Information and System Security, 1998
- A unified framework for enforcing multiple access control policiesPublished by Association for Computing Machinery (ACM) ,1997
- On a pattern-oriented model for intrusion detectionIEEE Transactions on Knowledge and Data Engineering, 1997
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Formal query languages for secure relational databasesACM Transactions on Database Systems, 1994
- MLR: a recovery method for multi-level systemsPublished by Association for Computing Machinery (ACM) ,1992
- A model of authorization for next-generation database systemsACM Transactions on Database Systems, 1991
- Multi-level recoveryPublished by Association for Computing Machinery (ACM) ,1990
- An authorization mechanism for a relational database systemACM Transactions on Database Systems, 1976