Abstract
Preventive measures sometimes fail to defect malicious attacks. With cyber attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of intrusion tolerant database systems is to detect attacks, and to assess and repair the damage caused by the attacks in a timely manner such that the database will not be damaged to such a degree that is unacceptable or useless. This paper focuses on efficient damage assessment and repair in resilient distributed database systems. The complexity of distributed database systems caused by data partition, distributed transaction processing, and failures makes damage assessment and repair much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35587-0_24
Chapter PDF
Similar content being viewed by others
Keywords
- Database System
- Intrusion Detection
- Damage Assessment
- Trans Action
- Defense Advance Research Project Agency
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. R. Adam. Security-Control Methods for Statistical Database: A Comparative Study. ACM Computing Surveys, 21 (4), 1989.
L. Alvisi and K. Marzullo. Message logging: Pessimistic, optimistic, causal and optimal. IEEE Transactions on Software Engineering, 24 (2): 149 — I59, 1998.
P. Ammann, S. Jajodia, and P. Liu. Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering, 2001. To appear.
V. Atluri, S. Jajodia, and B. George. Multilevel Secure Transaction Processing. Kluwer Academic Publishers, 1999.
D. Barbara, R. Goel, and S. Jajodia. Using checksums to detect data corruption. In Proceedings of the 2000 International Conference on Extending Data Base Technology, Mar 2000.
P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, MA, 1987.
A. Borg, J. Baumbach, and S. Glazer. A message system supporting fault tolerance. Operating System Review, 17 (5): 90–99, October 1983.
P. P. Griffiths and B. W. Wade. An Authorization Mechanism for a Relational Database System. ACM Transactions on Database Systems, 1 (3): 242–255, September 1976.
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Benin. A unified framework for enforcing multiple access control policies. In Proceedings of ACM SIGMOD International Conference on Management of Data, pages 474–485, May 1997.
H.F. Korth, E. Levy, and A. Silberschatz. A formal approach to recovery by compensating transactions. In Proceedings of the International Conference on Very Large Databases, pages 95–106, Brisbane, Australia, 1990.
P. Liu, P. Ammann, and S. Jajodia. Rewriting histories: Recovery from malicious transactions. Distributed and Parallel Databases, 8 (1): 7–40, 2000.
P. Luenam and P. Liu. Odam: An on-the-fly damage assessment and repair system for commercial database applications. In Proc. 15th IFIP WG11.3 Working Conference on Database and Application Security, 2001.
Teresa Lunt and Catherine McCollum. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA, 1998.
T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405418, June 1993.
J. McDermott and D. Goldschlag. Towards a model of storage jamming. In Proceedings of the IEEE Computer Security Foundations Workshop, pages 176–185, Kenmare, Ireland, June 1996.
C. Mohan, B. Lindsay, and R. Obermarck. Transaction management in the r* distributed database management system. ACM Transaction on Database Systems, 11 (4): 378–396, 1986.
B. Mukherjee, L. T. Heberlein, and K.N. Levitt. Network intrusion detection. IEEE Network, pages 26–41, June 1994.
B. Panda and J. Giordano. Reconstructing the database after electronic attacks. In Proceedings of the 12th IFIP 11.3 Working Conference on Database Security, Greece, Italy, July 1998.
R. Sandhu and F. Chen. The multilevel relational (mlr) data model. ACM Transactions on Information and Systems Security, 1(1), 1998.
R. E. Strom and S. Yemini. Optimistic recovery in distributed systems. ACM Transaction on Computer System, 3(3):204–226, August 1985.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Liu, P., Hao, X. (2002). Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. In: Olivier, M.S., Spooner, D.L. (eds) Database and Application Security XV. IFIP — The International Federation for Information Processing, vol 87. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35587-0_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-35587-0_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1028-1
Online ISBN: 978-0-387-35587-0
eBook Packages: Springer Book Archive