Skip to main content

Damage Quarantine and Recovery in Data Processing Systems

  • Chapter
  • 1730 Accesses

Summary

In this article, we address transparent Damage Quarantine and Recovery (DQR), a very important problem faced today by a large number of mission, life, and/or business-critical applications and information systems that must manage risk, business continuity, and assurance in the presence of severe cyber attacks. Today, these critical applications still have a “good” chance to su?er from a big “hit” from attacks. Due to data sharing, interdependencies, and interoperability, the hit could greatly “amplify” its damage by causing catastrophic cascading effects, which may “force” an application to halt for hours or even days before the application is recovered. In this paper, we ?rst do a thorough discussion on the limitations of traditional fault tolerance and failure recovery techniques in solving the DQR problem. Then we present a systematic review on how the DQR problem is being solved. Finally, we point out some remaining research issues in fully solving the DQR problem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Birman, K.P.: Reliable Distributed Systems: Technologies, Web Services, and Applications. Springer (2005)

    Google Scholar 

  2. Spector, A.Z., Daniels, D., Duchamp, D.: Distributed Transactions for Reliable Systems. In: ACM SOSP. (1985)

    Google Scholar 

  3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, MA (1987)

    Google Scholar 

  4. Gray, J., ed.: The Benchmark Handbook for Database and Transaction Processing Systems. 2 edn. Morgan Kaufmann Publishers, Inc. (1993)

    Google Scholar 

  5. Seltzer, M.I., Endo, Y., Small, C., Smith, K.A.: Dealing With Disaster: Surviving Misbehaved Kernel Extensions. In: OSDI. (1996)

    Google Scholar 

  6. Liskov, B., Rodrigues, R.: Transactional File Systems Can Be Fast. In: 11th ACM SIGOPS European Workshop. (2004)

    Google Scholar 

  7. Haskin, R., Malachi, Y., Sawdon, W., Chan, G.: Recovery management in Quick-Silver. ACM Transactions on Computer Systems 6(1) (1988)

    Google Scholar 

  8. Liskov, B., Curtis, D., Johnson, P., Scheifler, R.: Implementation of Argus . In: ACM SOSP. (1987) 111–122

    Google Scholar 

  9. Schneier, B.: Attack trends 2004 and 2005. ACM Queue 3(5) (June 2005)

    Article  Google Scholar 

  10. Carter, D.L., Katz, A.J.: Computer Crime: An Emerging Challenge for Law Enforcement. FBI Law Enforcement Bulletin 1(8) (December 1996)

    Google Scholar 

  11. OWASP: Owasp top ten most critical web application security vulnerabilities. http://www.owasp.org/documentation/topten.html (January, 27 2004)

    Google Scholar 

  12. Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks (1999) 2435–2463

    Google Scholar 

  13. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy. (1996)

    Google Scholar 

  14. Chung, C.Y., Gertz, M., Levitt, K.: Demids: A misuse detection system for database systems. In: 14th IFIP WG11.3 Working Conference on Database and Application Security. (2000)

    Google Scholar 

  15. Stolfo, S., Fan, D., Lee, W.: Credit card fraud detection using meta-learning: Issues and initial results. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. (1997)

    Google Scholar 

  16. Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion Detection in RBAC-administered Databases. In: Proceedings of the 21st Annual Computer Security Applications Conference. (2005)

    Google Scholar 

  17. Ilgun, K.: Ustat: A real-time intrusion detection system for unix. In: the IEEE Symposium on Security and Privacy, Oakland, CA (May 1993)

    Google Scholar 

  18. Javitz, H.S., Valdes, A.: The sri ides statistical anomaly detector. In: Proceedings IEEE Computer Society Symposium on Security and Privacy, Oakland, CA (May 1991)

    Google Scholar 

  19. Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: 2001 IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)

    Google Scholar 

  20. Ko, C., Ruschitzka, M., Levitt, K.: Execution monitoring of security-critical programs in distributed systems: a Specification-based approach. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. (1997)

    Google Scholar 

  21. Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S.: Implementation of Argus Specification-based anomaly detection: a new approach for detecting network intrusions. In: ACM CCS. (2002)

    Google Scholar 

  22. McDermott, J., Goldschlag, D.: Towards a model of storage jamming. In: the IEEE Computer Security Foundations Workshop, Kenmare, Ireland (June 1996) 176–185

    Google Scholar 

  23. Barbara, D., Goel, R., Jajodia, S.: “Using Checksums to Detect Data Corruption”. In: Int’l Conf. on Extending Data Base Technology. (Mar 2000)

    Google Scholar 

  24. Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: 4th Symposium on Operating System Design and Implementation, San Diego, CA (October 2000)

    Google Scholar 

  25. Lee, P., Anderson, T.: Fault Tolerance: Principles and Practice. 2nd edn. Springer-Verlag (1990)

    Google Scholar 

  26. Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: Aries: A transaction recovery method supporting fine-granularity locking. ACM Trans. on Database Systems 17(1) (1992) 94–162

    Article  Google Scholar 

  27. Borg, A., Blau, W., Graetsch, W., Herrmann, F., Oberle, W.: Fault Tolerance Under UNIX. ACM Transactions on Computer Systems 7(1) (1989) 1–24

    Article  Google Scholar 

  28. Muller, G., Banatre, M., Peyrouze, N., Rochat, R.: Lessons from FTM: An Experiment in the Design & Implementation of a Low-Cost Fault-Tolerant System. IEEE Transactions on Reliability 45(2) (1996) 332–340

    Article  Google Scholar 

  29. Elnozahy, E.N.M., Alvisi, L., Wang, Y.M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys 34(3) (September 2002) 375–408

    Article  Google Scholar 

  30. Lin, J.L., Dunham, M.H.: A survey of distributed database checkpointing. Distributed and Parallel Databases 5(3) (1997) 289–319

    Article  Google Scholar 

  31. Lin, J.L., Dunham, M.H.: A low-cost checkpointing technique for distributed databases. Distributed and Parallel Databases 10(3) (2001) 241–268

    Article  Google Scholar 

  32. Jefferson, D.R.: Virtual time. ACM Transaction on Programming Languages and Systems 7(3) (July 1985) 404–425

    Article  Google Scholar 

  33. Lin, Y., Lazowska, E.D.: A study of time warp rollback machanisms. ACM Transactions on Modeling and Computer Simulations 1(1) (January 1991) 51–72

    Article  MATH  Google Scholar 

  34. Siewiorek, D.P., Swarz, R.S.: Reliable Computer Systems: Design and Evaluation. 3rd edn. A K Peters (1998)

    Google Scholar 

  35. Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kycyman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery-oriented computing (roc): Motivation, definition, techniques, and case studies. Technical report, UC Berkeley Computer Science (2002) CSD-02-1175.

    Google Scholar 

  36. Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: Proceedings of the Eighth IEEE HOTOS. (2001)

    Google Scholar 

  37. Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity Operating Systems. In: ACM SOSP. (2003)

    Google Scholar 

  38. Ammann, P., Jajodia, S., Mavuluri, P.: On the fly reading of entire databases. IEEE Trans. on Knowledge and Data Engineering 7(5) (October 1995) 834–838

    Article  Google Scholar 

  39. Mohan, C., Pirahesh, H., Lorie, R.: Efficient and flexible methods for transient versioning of records to avoid locking by read-only trans. In: ACM SIGMOD International Conference on Management of Data, San Diego, CA (June 1992) 124–133

    Google Scholar 

  40. Pu, C.: On-the-fly, incremental, consistent reading of entire databases. Algorithmica 1(3) (October 1986) 271–287

    MATH  MathSciNet  Google Scholar 

  41. Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, Inc. (1993)

    Google Scholar 

  42. Dasgupta, P., Leblanc, R., Appelbe, W.: The Clouds distributed operating system. In: Proceedings 8th International Conference on Distributed Computing Systems, San Jose, Calif. (2002)

    Google Scholar 

  43. Dixon, G.N., Barrington, G.D., Shrivastava, S., Wheater, S.M.: The treatment of persistent objects in Arjuna. Comput. J. 32(4) (1989)

    Google Scholar 

  44. Gheith, A., Schwan, K.: CHAOS: Support for real-time atomic transactions. In: Proc. 19th International Symposium on Fault-Tolerant Computing, Chicago (1989)

    Google Scholar 

  45. Liskov, B., Scheifler, R.: Guardians and actions: Linguistic support for robust, distributed programs. ACM Transactions on Program. Lang. Syst. 5(3) (1983)

    Google Scholar 

  46. Nett, E., Kaiser, J., Kroger, R.: Providing recoverability in a transaction oriented distributed operating system. In: Proc. 6th International Symposium on Fault-Tolerant Computing, Cambridge (May 1986)

    Google Scholar 

  47. Clark, B.E., Corrtgan, M.J.: Application System/400 performance characteristics. IBM Syst. J. 28(3) (1989)

    Google Scholar 

  48. Crus, R.: Data recovery in IBM Database 2. IBM Syst. J. 23(2) (1984)

    Article  Google Scholar 

  49. Sql server. http://www.microsoft.com/sql/default.mspx

    Google Scholar 

  50. Oracle database. http://www.oracle.com/database/index.html

    Google Scholar 

  51. Db2 log analysis tool for z/os. http://www-306.ibm.com/software/data/db2imstools/db2tools/db2lat.html

    Google Scholar 

  52. Db2 recovery expert for multiplatforms. http://www-306.ibm.com/software/data/db2imstools/db2tools/db2re/

    Google Scholar 

  53. Oracle data protection and disaster recovery solutions. http://www.oracle.com/technology/deploy/availability/htdocs/OracleDR Solutions.html

    Google Scholar 

  54. Korth, H., Levy, E., Silberschatz, A.: A formal approach to recovery by compensating trans. In: the International Conference on Very Large Databases, Brisbane, Australia (1990) 95–106

    Google Scholar 

  55. Garcia-Molina, H.: Using semantic knowledge for transaction processing in a distributed database. ACM Trans. on Database Systems 8(2) (June 1983) 186–213

    Article  Google Scholar 

  56. Garcia-Molina, H., Salem, K.: Sagas. In: ACM-SIGMOD International Conference on Management of Data, San Francisco, CA (1987) 249–259

    Google Scholar 

  57. Lomet, D.: MLR: A recovery method for multi-level systems. In: ACM-SIGMOD International Conference on Management of Data, San Diego, CA (June 1992) 185–194

    Google Scholar 

  58. Weikum, G., Hasse, C., Broessler, P., Muth, P.: Multi-level recovery. In: the Ninth ACM SIGACT-SIGMOD-SIGART Symposium of Principles of Database Systems, Nashville, Tenn (April 1990) 109–123

    Google Scholar 

  59. Weikum, G., Schek, H.J.: Concepts and applications of multilevel trans. and open nested trans. In Elmagarmid, A.K., ed.: Database Transaction Models for Advanced Applications. Morgan Kaufmann Publishers, Inc. (1992)

    Google Scholar 

  60. Gray, J., Helland, P., O’Neil, P., Shasha, S.: The dangers of replication and a solution. In: ACM SIGMOD. (1996)

    Google Scholar 

  61. Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys 22(4) (December 1990) 299–319

    Article  Google Scholar 

  62. Berman, K., Cooper, R.: The ISIS Project: Real Experience with a Fault Tolerant Programming System. Operating Systems Review (1991) 103–107

    Google Scholar 

  63. CA data availability solutions. http://www3.ca.com/solutions/SubSolution.aspx?ID=312

    Google Scholar 

  64. Symantec livestate recovery products provide fast, reliable and cost-effective system and data recovery. http://www.symantec.com/press/2004/n041005.html

    Google Scholar 

  65. Sonasoft disaster recovery solutions. http://www.sonasoft.com/solutions/disaster.asp

    Google Scholar 

  66. Zhu, N., Chiueh, T.C.: Design, implementation, and evaluation of repairable file service. In: Proceedings of the IEEE Dependable Systems and Networks. (2003)

    Google Scholar 

  67. Goel, A., Po, K., Farhadi, K., Li, Z., Lara, E.D.: The Taser Intrusion Recovery System. In: ACM SOSP. (2005)

    Google Scholar 

  68. Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious trans. IEEE Trans. on Knowledge and Data Engineering 15(5) (2002) 1167–1185

    Article  Google Scholar 

  69. Yu, M., Liu, P., Zang, W.: “Self Healing Workflow Systems under Attacks”. In: 24th IEEE Int’l Conf. on Distributed Computing Systems. (2004)

    Google Scholar 

  70. Lomet, D., Vagena, Z., Barga, R.: Recovery from Bad User Transactions. In: ACM SIGMOD. (2006)

    Google Scholar 

  71. Panda, B., Giordano, J.: Reconstructing the database after electronic attacks. In: the 12th IFIP 11.3 Working Conference on Database Security, Greece, Italy (July 1998)

    Google Scholar 

  72. Liu, P., Jing, J., Luenam, P., Wang, Y., Li, L., Ingsriswang, S.: “The Design and Implementation of a Self-Healing Database System”. J. of Intelligent Information Systems (JIIS) 23(3) (2004) 247–269

    Article  MATH  Google Scholar 

  73. Pilania, D., Chiueh, T.: Design, Implementation, and Evaluation of an Intrusion Resilient Database System. In: Proc. International Conference on Data Engineering. (2005)

    Google Scholar 

  74. Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: Recovery from malicious trans. Distributed and Parallel Databases 8(1) (2000) 7–40

    Article  Google Scholar 

  75. Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for intrusion tolerance. In: 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada (June 2001)

    Google Scholar 

  76. Ammann, P., Jajodia, S., McCollum, C., Blaustein, B.: Surviving information warfare attacks on databases. In: the IEEE Symposium on Security and Privacy, Oakland, CA (May 1997) 164–174

    Google Scholar 

  77. Liu, P., Jajodia, S., McCollum, C.: Intrusion confinement by isolation in information systems. J. of Computer Security 8(4) (2000) 243–279

    Google Scholar 

  78. Liu, P., Wang, H., Li, L.: Real-time Data Attack Isolation for Commercial Database Applications. Elsevier Journal of Network and Computer Applications 29(4) (2006) 294–320

    Article  Google Scholar 

  79. Trivedi, K.S.: “Probability and statistics with reliability, queuing and computer science applications”. John Wiley and Sons (2002)

    Google Scholar 

  80. Wang, H., Liu, P.: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. In: Proc. ESORICS (European Symposium on Research in Computer Security). (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC.

About this chapter

Cite this chapter

Liu, P., Jajodia, S., Yu, M. (2008). Damage Quarantine and Recovery in Data Processing Systems. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48533-1_16

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48532-4

  • Online ISBN: 978-0-387-48533-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics