Abstract | ||
---|---|---|
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed to recover a damaged database from malicious attacks. This approach can track the damage spreading more completely by maintaining before image tables (BI tables) in databases and analyzing transactions’ potential-read to the BI tables. BI tables are also used for damage repair without accessing database logs. Experimental evaluation of the overhead of this method based upon TPC-C benchmark is also presented. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/FCST.2008.25 | FCST |
Keywords | Field | DocType |
image table,novel approach,corrupted data,damaged database,accessing database log,traditional damage assessment approach,post-intrusion database,damage repair,tpc-c benchmark,damaged databases,extended recovery model arm,bi table,intrusion tolerance,delta modulation,maintenance engineering,data models,database systems,databases,database management systems,bismuth,argon | Data mining,Data modeling,Computer science,System recovery,Delta modulation,Maintenance engineering,Database | Conference |
Citations | PageRank | References |
8 | 0.55 | 7 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Meiyi Xie | 1 | 8 | 1.22 |
Hong Zhu | 2 | 81 | 7.20 |
Yucai Feng | 3 | 29 | 8.58 |
Guanrong Hu | 4 | 8 | 0.55 |