ODAR: an on-the-fly damage assessment and repair system for commercial database applications

作者: Pramote Luenam , Peng Liu

DOI: 10.1007/978-0-387-35587-0_17

关键词:

摘要: This paper presents the design and implementation of an on-the-fly damage assessment repair tool for intrusion tolerant commercial database applications, called ODAR. ODAR is a COTS-DBMS-specific general approach developed by P. Ammann, S. Jajodia, Liu in [8]. The approach, given set malicious transactions reported detector, locates repairs caused each transaction on database, along with any benign that affected, directly or indirectly, transaction. without need to periodically halt normal processing. In this paper, development first prototype, which Oracle Server 8.1.6, discussed. uses triggers profiles keep track read write operations transactions, tracing affecting relationships among history, composing executing some specific UNDO transactions. transparent on-going user very general. addition Oracle, it can be easily adapted support many other application platforms such as Microsoft SQL Server, Sybase, Informix. To our best knowledge, do automatic applications.

参考文章(18)
Daniel Barbará, Rajni Goel, Sushil Jajodia, Using Checksums to Detect Data Corruption extending database technology. pp. 136- 149 ,(2000) , 10.1007/3-540-46439-5_9
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Ravi Sandhu, Fang Chen, The multilevel relational (MLR) data model ACM Transactions on Information and System Security. ,vol. 1, pp. 93- 132 ,(1998) , 10.1145/290163.290171
Marianne Winslett, Kenneth Smith, Xiaolei Qian, Formal query languages for secure relational databases ACM Transactions on Database Systems. ,vol. 19, pp. 626- 662 ,(1994) , 10.1145/195664.195675
Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk, A model of authorization for next-generation database systems ACM Transactions on Database Systems. ,vol. 16, pp. 88- 131 ,(1991) , 10.1145/103140.103144
Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Eliza Bertino, A unified framework for enforcing multiple access control policies international conference on management of data. ,vol. 26, pp. 474- 485 ,(1997) , 10.1145/253260.253364
Patricia P. Griffiths, Bradford W. Wade, An authorization mechanism for a relational database system ACM Transactions on Database Systems. ,vol. 1, pp. 242- 255 ,(1976) , 10.1145/320473.320482
Sushil Jajodia, Ravi Mukkamala, Vijayalakshmi Atluri, Catherine D. McCollum, Thomas F. Keefe, Multilevel secure transaction processing ,(1999)
K. Ilgun, R.A. Kemmerer, P.A. Porras, State transition analysis: a rule-based intrusion detection approach IEEE Transactions on Software Engineering. ,vol. 21, pp. 181- 199 ,(1995) , 10.1109/32.372146
Igor Tatarinov, Stratis D. Viglas, Kevin Beyer, Jayavel Shanmugasundaram, Eugene Shekita, Chun Zhang, Storing and querying ordered XML using a relational database system Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. pp. 204- 215 ,(2002) , 10.1145/564691.564715