Efficient damage assessment and repair in resilient distributed database systems

作者: Peng Liu , Xu Hao

DOI: 10.1007/978-0-387-35587-0_6

关键词:

摘要: Preventive measures sometimes fail to defect malicious attacks. With cyber attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of is detect attacks, and assess repair the damage caused by in timely manner such that will not be damaged degree unacceptable or useless. This paper focuses efficient assessment resilient distributed systems. complexity data partition, transaction processing, failures makes much challenging than centralized identifies key challenges presents algorithm for repair.

参考文章(20)
Daniel Barbará, Rajni Goel, Sushil Jajodia, Using Checksums to Detect Data Corruption extending database technology. pp. 136- 149 ,(2000) , 10.1007/3-540-46439-5_9
Pramote Luenam, Peng Liu, ODAR: an on-the-fly damage assessment and repair system for commercial database applications Das'01 Proceedings of the fifteenth annual working conference on Database and application security. pp. 239- 252 ,(2001) , 10.1007/978-0-387-35587-0_17
Peng Liu, Paul Ammann, Sushil Jajodia, Rewriting Histories: Recovering from Malicious Transactions Distributed and Parallel Databases. ,vol. 8, pp. 7- 40 ,(2000) , 10.1023/A:1008731200105
Henry F Korth, Eliezer Levy, Abraham Silberschatz, None, A formal approach to recovery by compensating transactions very large data bases. pp. 95- 106 ,(1990)
Brajendra Panda, Joseph Giordano, Reconstructing the Database after Electronic Attacks Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects. pp. 143- 156 ,(1998) , 10.1007/978-0-387-35564-1_9
Nathan Goodman, Philip A. Bernstein, Vassco Hadzilacos, Concurrency Control and Recovery in Database Systems ,(1987)
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Ravi Sandhu, Fang Chen, The multilevel relational (MLR) data model ACM Transactions on Information and System Security. ,vol. 1, pp. 93- 132 ,(1998) , 10.1145/290163.290171
Anita Borg, Jim Baumbach, Sam Glazer, A message system supporting fault tolerance symposium on operating systems principles. ,vol. 17, pp. 90- 99 ,(1983) , 10.1145/773379.806617
Rob Strom, Shaula Yemini, Optimistic recovery in distributed systems ACM Transactions on Computer Systems. ,vol. 3, pp. 204- 226 ,(1985) , 10.1145/3959.3962