Rewriting histories: Recovering from malicious transactions

被引:54
|
作者
Liu, P [1 ]
Ammann, P
Jajodia, S
机构
[1] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21201 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
information warfare; trusted recovery; databases; security; malicious transactions; transaction histories;
D O I
10.1023/A:1008731200105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of good transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. We develop an algorithm that rewrites execution histories for the purpose of backing out malicious transactions. Good transactions that are affected, directly or indirectly, by malicious transactions complicate the process of backing out undesirable transactions. We show that the prefix of a rewritten history produced by the algorithm serializes exactly the set of unaffected good transactions. The suffix of the rewritten history includes special state information to describe affected good transactions as well as malicious transactions. We describe techniques that can extract additional good transactions from this latter part of a rewritten history. The latter processing saves more good transactions than is possible with a dependency-graph based approach to recovery.
引用
收藏
页码:7 / 40
页数:34
相关论文
共 50 条
  • [11] Rewriting and Rerighting Indigenous Histories
    Fisher, Andrew H.
    REVIEWS IN AMERICAN HISTORY, 2020, 48 (01) : 63 - 69
  • [12] Identification of malicious transactions in database systems
    Hu, Y
    Panda, B
    SEVENTH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2003, : 329 - 335
  • [13] Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions
    Rao, Udai Pratap
    Patel, Dhiren R.
    INFORMATION SECURITY JOURNAL, 2013, 22 (01): : 35 - 45
  • [14] Dynamic Recovering of Long Running Transactions
    Vaz, Catia
    Ferreira, Carla
    Ravara, Antonio
    TRUSTWORTHY GLOBAL COMPUTING, 2009, 5474 : 201 - +
  • [15] Malicious Users' Transactions: Tackling Insider Threat
    Li, Weihan
    Panda, Brajendra
    Yaseen, Qussai
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 211 - 222
  • [16] Writing and rewriting national theatre histories
    Ybarra, P
    THEATRE JOURNAL, 2005, 57 (03) : 550 - 551
  • [17] An auto-generating approach of transactions profile graph in detection of malicious transactions
    Chen, Jinfu
    Lu, Yansheng
    Me, Xiaodong
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 562 - 565
  • [18] Rewriting Colonial Histories in Historical Fictions for the Young: From Below and Above
    Grzegorczyk, Blanka
    BOOKBIRD-A JOURNAL OF INTERNATIONAL CHILDRENS LITERATURE, 2012, 50 (03) : 34 - 46
  • [19] Recovering an OSPF Network from Malicious Attacks: An Experimental Evaluation of Recovery Techniques
    Meredith, Russell
    Landsberg, Natalie
    Lopez, Agueo
    Dutta, Rudra
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [20] Rewriting Histories of the Use of Force: The Narrative of Indifference'.
    Ruys, Tom
    Verdebout, Agatha
    EUROPEAN JOURNAL OF INTERNATIONAL LAW, 2023, 34 (03) : 728 - 737