• DocumentCode
    2188079
  • Title

    Tracking and Repairing Damaged Databases Using Before Image Table

  • Author

    Xie, Meiyi ; Zhu, Hong ; Feng, Yucai ; Hu, Guanrong

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
  • fYear
    2008
  • fDate
    27-28 Dec. 2008
  • Firstpage
    36
  • Lastpage
    41
  • Abstract
    Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed to recover a damaged database from malicious attacks. This approach can track the damage spreading more completely by maintaining before image tables (BI tables) in databases and analyzing transactions´ potential-read to the BI tables. BI tables are also used for damage repair without accessing database logs. Experimental evaluation of the overhead of this method based upon TPC-C benchmark is also presented.
  • Keywords
    database management systems; security of data; system recovery; TPC-C benchmark; before image table; damage assessment approaches; damaged database repairing; extended recovery model; malicious attacks; post-intrusion database; Arm; Bismuth; Computer science; Data analysis; Data security; Database systems; Image analysis; Image databases; Investments; Transaction databases; BI table; damage assessment; damage spreading; intrusion tolerant;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
  • Conference_Location
    Nagasahi
  • Print_ISBN
    978-1-4244-3418-3
  • Type

    conf

  • DOI
    10.1109/FCST.2008.25
  • Filename
    4736507