作者: S. Jajodia , Peng Liu , C.D. McCollum
关键词:
摘要: System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. The capacity of these techniques, however is limited: innocent users may mistaken for ones while stay at large. Isolation a method that has been applied protect systems from damage investigating further. This paper proposes the use isolation an application level gain its benefits minimizing loss resources productive work in case incidents later deemed innocent. We describe our scheme database context. It isolates transparently further suspected malicious, still maintaining continued availability their transactions. complicated inconsistencies develop between isolated versions. present both static dynamic approaches identify resolve conflicts. Finally, we give several examples applications which should worthwhile able achieve good performance.