Skip to main content

Reducing Damage Assessment Latency in Survivable Databases

  • Conference paper
Key Technologies for Data Management (BNCOD 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3112))

Included in the following conference series:

Abstract

Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corrupt one or more data items; benign transactions reading these data items and writing on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment are needed. In this paper we look at two existing techniques for damage assessment and analyze their complexity. We also propose a new technique that improves upon the existing techniques by reducing the time required for damage assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering 14(5), 1167–1185 (2002)

    Article  Google Scholar 

  2. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)

    Google Scholar 

  3. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. McGraw Hill, Boston (2001)

    MATH  Google Scholar 

  4. Jajodia, S., McCollum, C.D., Ammann, P.: Trusted recovery: An important phase of information warfare defense. Communications of the ACM 42(7), 71–75 (1999)

    Article  Google Scholar 

  5. Lala, C., Panda, B.: Evaluating damage from cyber attacks. IEEE Transactions on Systems, Man and Cybernetics 31(4), 300–310 (2001)

    Article  Google Scholar 

  6. Lala, C., Panda, B.: On achieving fast damage appraisal in case of cyber attacks. In: Proceedings of the IEEE Workshop on Information Assurance, West Point, NY (2000)

    Google Scholar 

  7. Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for intrusion tolerance. In: Proc. 14th IEEE Computer Security Foundations Workshop (2001)

    Google Scholar 

  8. Liu, P., Jajodia, S., McCollum, C.D.: Intrusion confinement by isolation in information systems. In: IFIP Workshop on Database Security, pp. 3–18 (1999)

    Google Scholar 

  9. Panda, B., Giordano, J.: Reconstructing the database after electronic attacks. In: Proceedings of the 12th Annual Working Conference on Database Security, Chalkidiki, Greece (1998)

    Google Scholar 

  10. Panda, B., Haque, K.A.: Extended data dependency approach - a robust way of rebuilding database. In: ACM Symposium on Applied Computing, pp. 446–452 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ray, I., McConnell, R.M., Lunacek, M., Kumar, V. (2004). Reducing Damage Assessment Latency in Survivable Databases. In: Williams, H., MacKinnon, L. (eds) Key Technologies for Data Management. BNCOD 2004. Lecture Notes in Computer Science, vol 3112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27811-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27811-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22382-5

  • Online ISBN: 978-3-540-27811-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics