Abstract
Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corrupt one or more data items; benign transactions reading these data items and writing on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment are needed. In this paper we look at two existing techniques for damage assessment and analyze their complexity. We also propose a new technique that improves upon the existing techniques by reducing the time required for damage assessment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Transactions on Knowledge and Data Engineering 14(5), 1167–1185 (2002)
Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. McGraw Hill, Boston (2001)
Jajodia, S., McCollum, C.D., Ammann, P.: Trusted recovery: An important phase of information warfare defense. Communications of the ACM 42(7), 71–75 (1999)
Lala, C., Panda, B.: Evaluating damage from cyber attacks. IEEE Transactions on Systems, Man and Cybernetics 31(4), 300–310 (2001)
Lala, C., Panda, B.: On achieving fast damage appraisal in case of cyber attacks. In: Proceedings of the IEEE Workshop on Information Assurance, West Point, NY (2000)
Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for intrusion tolerance. In: Proc. 14th IEEE Computer Security Foundations Workshop (2001)
Liu, P., Jajodia, S., McCollum, C.D.: Intrusion confinement by isolation in information systems. In: IFIP Workshop on Database Security, pp. 3–18 (1999)
Panda, B., Giordano, J.: Reconstructing the database after electronic attacks. In: Proceedings of the 12th Annual Working Conference on Database Security, Chalkidiki, Greece (1998)
Panda, B., Haque, K.A.: Extended data dependency approach - a robust way of rebuilding database. In: ACM Symposium on Applied Computing, pp. 446–452 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ray, I., McConnell, R.M., Lunacek, M., Kumar, V. (2004). Reducing Damage Assessment Latency in Survivable Databases. In: Williams, H., MacKinnon, L. (eds) Key Technologies for Data Management. BNCOD 2004. Lecture Notes in Computer Science, vol 3112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27811-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-27811-5_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22382-5
Online ISBN: 978-3-540-27811-5
eBook Packages: Springer Book Archive