Title
Tracking and Repairing Damaged Databases Using Before Image Table
Abstract
Traditional damage assessment approaches can only locate damage caused by reading corrupted data in a post-intrusion database. This paper indicates another kind of damage spreading pattern characterized by omitting maliciously deleted data, which was not considered in previous studies. An extended recovery model arms at this problem is presented and a novel approach based on the model is proposed to recover a damaged database from malicious attacks. This approach can track the damage spreading more completely by maintaining before image tables (BI tables) in databases and analyzing transactions’ potential-read to the BI tables. BI tables are also used for damage repair without accessing database logs. Experimental evaluation of the overhead of this method based upon TPC-C benchmark is also presented.
Year
DOI
Venue
2008
10.1109/FCST.2008.25
FCST
Keywords
Field
DocType
image table,novel approach,corrupted data,damaged database,accessing database log,traditional damage assessment approach,post-intrusion database,damage repair,tpc-c benchmark,damaged databases,extended recovery model arm,bi table,intrusion tolerance,delta modulation,maintenance engineering,data models,database systems,databases,database management systems,bismuth,argon
Data mining,Data modeling,Computer science,System recovery,Delta modulation,Maintenance engineering,Database
Conference
Citations 
PageRank 
References 
8
0.55
7
Authors
4
Name
Order
Citations
PageRank
Meiyi Xie181.22
Hong Zhu2817.20
Yucai Feng3298.58
Guanrong Hu480.55