Damage Quarantine and Recovery in Data Processing Systems

作者: Peng Liu , Sushil Jajodia , Meng Yu

DOI: 10.1007/978-0-387-48533-1_16

关键词:

摘要: In this article, we address transparent Damage Quarantine and Recovery (DQR), a very important problem faced today by large number of mission, life, and/or business-critical applications information systems that must manage risk, business continuity, assurance in the presence severe cyber attacks. Today, these critical still have “good” chance to su?er from big “hit” Due data sharing, interdependencies, interoperability, hit could greatly “amplify” its damage causing catastrophic cascading effects, which may “force” an application halt for hours or even days before is recovered. paper, ?rst do thorough discussion on limitations traditional fault tolerance failure recovery techniques solving DQR problem. Then present systematic review how being solved. Finally, point out some remaining research issues fully

参考文章(78)
Callon Pu, On-the-fly, incremental, consistent reading of entire databases very large data bases. ,vol. 1, pp. 369- 375 ,(1985) , 10.1007/BF01840448
Jun-Lin Lin, Margaret H. Dunham, A Low-Cost Checkpointing Technique for Distributed Databases Distributed and Parallel Databases. ,vol. 10, pp. 241- 268 ,(2001) , 10.1023/A:1019265308523
Jörg Kaiser, Edgar Nett, Reinhold Kröger, Providing Recoverability in a Transaction Oriented Distributed Operating System. international conference on distributed computing systems. pp. 590- 597 ,(1986)
Richard J. LeBlanc, Partha Dasgupta, William F. Appelbe, The Clouds Distributed Operating System. international conference on distributed computing systems. pp. 2- 9 ,(1988)
Jim Gray, Benchmark Handbook: For Database and Transaction Processing Systems Morgan Kaufmann Publishers Inc.. ,(1992)
Daniel Barbará, Rajni Goel, Sushil Jajodia, Using Checksums to Detect Data Corruption extending database technology. pp. 136- 149 ,(2000) , 10.1007/3-540-46439-5_9
Peng Liu, Sushil Jajodia, Catherine D. McCollum, Intrusion confinement by isolation in information systems Journal of Computer Security. ,vol. 8, pp. 243- 279 ,(2000) , 10.3233/JCS-2000-8402
Jun-Lin Lin, Margaret H. Dunham, A Survey of Distributed Database Checkpointing Distributed and Parallel Databases. ,vol. 5, pp. 289- 319 ,(1997) , 10.1023/A:1008689312900
Peng Liu, Paul Ammann, Sushil Jajodia, Rewriting Histories: Recovering from Malicious Transactions Distributed and Parallel Databases. ,vol. 8, pp. 7- 40 ,(2000) , 10.1023/A:1008731200105