DocumentCode
2188079
Title
Tracking and Repairing Damaged Databases Using Before Image Table
Author
Xie, Meiyi ; Zhu, Hong ; Feng, Yucai ; Hu, Guanrong
Author_Institution
Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
fYear
2008
fDate
27-28 Dec. 2008
Firstpage
36
Lastpage
41
Abstract
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed to recover a damaged database from malicious attacks. This approach can track the damage spreading more completely by maintaining before image tables (BI tables) in databases and analyzing transactions´ potential-read to the BI tables. BI tables are also used for damage repair without accessing database logs. Experimental evaluation of the overhead of this method based upon TPC-C benchmark is also presented.
Keywords
database management systems; security of data; system recovery; TPC-C benchmark; before image table; damage assessment approaches; damaged database repairing; extended recovery model; malicious attacks; post-intrusion database; Arm; Bismuth; Computer science; Data analysis; Data security; Database systems; Image analysis; Image databases; Investments; Transaction databases; BI table; damage assessment; damage spreading; intrusion tolerant;
fLanguage
English
Publisher
ieee
Conference_Titel
Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
Conference_Location
Nagasahi
Print_ISBN
978-1-4244-3418-3
Type
conf
DOI
10.1109/FCST.2008.25
Filename
4736507
Link To Document