Rewriting histories: Recovering from malicious transactions

被引:54
|
作者
Liu, P [1 ]
Ammann, P
Jajodia, S
机构
[1] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21201 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
information warfare; trusted recovery; databases; security; malicious transactions; transaction histories;
D O I
10.1023/A:1008731200105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of good transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. We develop an algorithm that rewrites execution histories for the purpose of backing out malicious transactions. Good transactions that are affected, directly or indirectly, by malicious transactions complicate the process of backing out undesirable transactions. We show that the prefix of a rewritten history produced by the algorithm serializes exactly the set of unaffected good transactions. The suffix of the rewritten history includes special state information to describe affected good transactions as well as malicious transactions. We describe techniques that can extract additional good transactions from this latter part of a rewritten history. The latter processing saves more good transactions than is possible with a dependency-graph based approach to recovery.
引用
收藏
页码:7 / 40
页数:34
相关论文
共 50 条
  • [1] Rewriting Histories: Recovering from Malicious Transactions
    Peng Liu
    Paul Ammann
    Sushil Jajodia
    Distributed and Parallel Databases, 2000, 8 : 7 - 40
  • [2] Recovery from malicious transactions
    Ammann, P
    Jajodia, S
    Liu, P
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (05) : 1167 - 1185
  • [3] Rewriting histories
    Pankova, Lenka
    COMPARATIVE LITERATURE STUDIES, 2008, 45 (02) : 261 - 263
  • [4] Recovering from malicious attacks in workflow systems
    Zhu, YJ
    Xin, T
    Ray, I
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2005, 3588 : 14 - 23
  • [5] Rewriting the self: Histories from the Renaissance to the present
    Clymer, L
    EIGHTEENTH-CENTURY STUDIES, 2002, 35 (02) : 284 - 291
  • [6] Rewriting the self: Histories from the renaissance to the present
    Cosgrove, D
    JOURNAL OF HISTORICAL GEOGRAPHY, 1999, 25 (01) : 99 - 101
  • [7] Rewriting the self: Histories from the Renaissance to the present
    Housden, M
    HISTORY, 1999, 84 (273) : 97 - 98
  • [8] Detection of malicious transactions in DBMS
    Vieira, M
    Madeira, H
    11th Pacific Rim International Symposium on Dependable Computing, Proceedings, 2005, : 350 - 357
  • [9] Database Recovery from Malicious Transactions: A Use of Provenance Information
    Rhujittawiwat, Theppatorn
    Ravan, John
    Saaudi, Ahmed
    Banik, Shankar
    Farkas, Csilla
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA), 2021, : 39 - 48
  • [10] Histories and Discourses: Rewriting Constructivism
    Schaefer, Richard
    EUROPEAN LEGACY-TOWARD NEW PARADIGMS, 2010, 15 (01): : 119 - 120