Abstract
Damage assessment and recovery in a distributed database system in a post information attack detection scenario is a complicated process due to the indirect dependencies among (sub) transactions that are executed in various sites. Particularly, damage assessment in such a system requires collaborations among multiple participant sites as a result of distributed transactions. In this paper, we discuss two primary models, namely, centralized and peer-to-peer, to conduct damage assessment after an intrusion on a distributed database system is reported. For the centralized model, three different options have been presented. Advantages and disadvantages of each model are discussed.
Chapter PDF
References
P. Ammann, S. Jajodia, C. D. McCollum, and B. Blaustein, “Surviving Information Privacy, p. 164–174, Oakland, CA, May 1997.
E. Bernstien, V. Hadzilacos, and N. Goodman, “Concurrency Control and Recovery in Database Systems”. Addison-Wesley, Reading, MA, 1987.
R. Graubart, L. Schlipper, and C. McCollum, “Defending Database Management Systems against Information Warfare Attacks”. Technical report, The MITRE Corporation, 1996.
S. Jajodia, C. D. McCollum, and P. Amman, “Trusted Recovery”. Communications of the ACM, 42(7), pp. 71–75, July 1999.
H. Korth, E. Levy, and A. Silberschatz, “A Formal Approach to Recovery by Compensating Transaction”. In Proceedings of the 16 th VLDB Conference, Brisbane, Australia, 1990.
Scott D. Lathrop, Gregory J. Conti, Daniel J. Ragsdale, “Information Warfare in the Trenches”. Security education and Critical Infrastructures, January 2003.
Peng Liu, Xu Hao, “Efficient Damage Assessment and Repair in Resilient Distributed Database Systems”. IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Security, July 15–18, 2001.
P. Liu, P. Ammann, and S. Jajodia, “Rewriting Histories: Recovering from Malicious Transactions”. Distributed and Parallel Databases, 8(1), pp. 7–40, January 2000.
B. Panda and J. Giordano, “Reconstructing the Database After Electronic Attacks”. Database Security XII: Status and Prospects, S. Jajodia (editor), Kluwer Academic Publishers, 1999.
P. Ragothaman, and B. Panda, “Modeling and Analyzing Transaction Logging Protocols for Effective Damage Assessment”, In Proceedings of the 16 th Annual IFIP WG 11.3 Working Conference on Data and Application Security, King’s College, University of Cambridge, UK, July 2002.
R. Sobhan and B. Panda, “Reorganization of Database Log for Information Warfare Data Recovery”. In Proceedings of the 15 th Annual IFIP WG 11.3 Working Conference on Database and Application Security, Niagara on the Lake, Ontario, Canada, July 15–18,2001.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Zuo, Y., Panda, B. (2004). Damage Discovery in Distributed Database Systems. In: Farkas, C., Samarati, P. (eds) Research Directions in Data and Applications Security XVIII. IFIP International Federation for Information Processing, vol 144. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8128-6_8
Download citation
DOI: https://doi.org/10.1007/1-4020-8128-6_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8127-9
Online ISBN: 978-1-4020-8128-6
eBook Packages: Springer Book Archive