作者
Paul Ammann, Sushil Jajodia, Peng Liu
发表日期
2002/11/7
期刊
IEEE transactions on knowledge and data engineering
卷号
14
期号
5
页码范围
1167-1185
出版商
IEEE
简介
Preventive measures sometimes fail to deflect malicious attacks. We adopt an information warfare perspective, which assumes success by the attacker in achieving partial, but not complete, damage. In particular, we work in the database context and consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Recovery is complicated by the presence of benign transactions that depend, directly or indirectly, on the malicious transactions. We present algorithms to restore only the damaged part of the database. We identify the information that needs to be maintained for such algorithms. The initial algorithms repair damage to quiescent databases; subsequent algorithms …
引用总数
2001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202336817182115181318881456211665844
学术搜索中的文章
P Ammann, S Jajodia, P Liu - IEEE transactions on knowledge and data engineering, 2002