Title :
Tracking and Repairing Damaged Databases Using Before Image Table
Author :
Xie, Meiyi ; Zhu, Hong ; Feng, Yucai ; Hu, Guanrong
Author_Institution :
Sch. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan, China
Abstract :
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed to recover a damaged database from malicious attacks. This approach can track the damage spreading more completely by maintaining before image tables (BI tables) in databases and analyzing transactions´ potential-read to the BI tables. BI tables are also used for damage repair without accessing database logs. Experimental evaluation of the overhead of this method based upon TPC-C benchmark is also presented.
Keywords :
database management systems; security of data; system recovery; TPC-C benchmark; before image table; damage assessment approaches; damaged database repairing; extended recovery model; malicious attacks; post-intrusion database; Arm; Bismuth; Computer science; Data analysis; Data security; Database systems; Image analysis; Image databases; Investments; Transaction databases; BI table; damage assessment; damage spreading; intrusion tolerant;
Conference_Titel :
Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop on
Conference_Location :
Nagasahi
Print_ISBN :
978-1-4244-3418-3
DOI :
10.1109/FCST.2008.25