Summary
In this article, we address transparent Damage Quarantine and Recovery (DQR), a very important problem faced today by a large number of mission, life, and/or business-critical applications and information systems that must manage risk, business continuity, and assurance in the presence of severe cyber attacks. Today, these critical applications still have a “good” chance to su?er from a big “hit” from attacks. Due to data sharing, interdependencies, and interoperability, the hit could greatly “amplify” its damage by causing catastrophic cascading effects, which may “force” an application to halt for hours or even days before the application is recovered. In this paper, we ?rst do a thorough discussion on the limitations of traditional fault tolerance and failure recovery techniques in solving the DQR problem. Then we present a systematic review on how the DQR problem is being solved. Finally, we point out some remaining research issues in fully solving the DQR problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Birman, K.P.: Reliable Distributed Systems: Technologies, Web Services, and Applications. Springer (2005)
Spector, A.Z., Daniels, D., Duchamp, D.: Distributed Transactions for Reliable Systems. In: ACM SOSP. (1985)
Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, MA (1987)
Gray, J., ed.: The Benchmark Handbook for Database and Transaction Processing Systems. 2 edn. Morgan Kaufmann Publishers, Inc. (1993)
Seltzer, M.I., Endo, Y., Small, C., Smith, K.A.: Dealing With Disaster: Surviving Misbehaved Kernel Extensions. In: OSDI. (1996)
Liskov, B., Rodrigues, R.: Transactional File Systems Can Be Fast. In: 11th ACM SIGOPS European Workshop. (2004)
Haskin, R., Malachi, Y., Sawdon, W., Chan, G.: Recovery management in Quick-Silver. ACM Transactions on Computer Systems 6(1) (1988)
Liskov, B., Curtis, D., Johnson, P., Scheifler, R.: Implementation of Argus . In: ACM SOSP. (1987) 111–122
Schneier, B.: Attack trends 2004 and 2005. ACM Queue 3(5) (June 2005)
Carter, D.L., Katz, A.J.: Computer Crime: An Emerging Challenge for Law Enforcement. FBI Law Enforcement Bulletin 1(8) (December 1996)
OWASP: Owasp top ten most critical web application security vulnerabilities. http://www.owasp.org/documentation/topten.html (January, 27 2004)
Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks (1999) 2435–2463
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy. (1996)
Chung, C.Y., Gertz, M., Levitt, K.: Demids: A misuse detection system for database systems. In: 14th IFIP WG11.3 Working Conference on Database and Application Security. (2000)
Stolfo, S., Fan, D., Lee, W.: Credit card fraud detection using meta-learning: Issues and initial results. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management. (1997)
Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion Detection in RBAC-administered Databases. In: Proceedings of the 21st Annual Computer Security Applications Conference. (2005)
Ilgun, K.: Ustat: A real-time intrusion detection system for unix. In: the IEEE Symposium on Security and Privacy, Oakland, CA (May 1993)
Javitz, H.S., Valdes, A.: The sri ides statistical anomaly detector. In: Proceedings IEEE Computer Society Symposium on Security and Privacy, Oakland, CA (May 1991)
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: 2001 IEEE Symposium on Security and Privacy, Oakland, CA (May 2001)
Ko, C., Ruschitzka, M., Levitt, K.: Execution monitoring of security-critical programs in distributed systems: a Specification-based approach. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. (1997)
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S.: Implementation of Argus Specification-based anomaly detection: a new approach for detecting network intrusions. In: ACM CCS. (2002)
McDermott, J., Goldschlag, D.: Towards a model of storage jamming. In: the IEEE Computer Security Foundations Workshop, Kenmare, Ireland (June 1996) 176–185
Barbara, D., Goel, R., Jajodia, S.: “Using Checksums to Detect Data Corruption”. In: Int’l Conf. on Extending Data Base Technology. (Mar 2000)
Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: 4th Symposium on Operating System Design and Implementation, San Diego, CA (October 2000)
Lee, P., Anderson, T.: Fault Tolerance: Principles and Practice. 2nd edn. Springer-Verlag (1990)
Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: Aries: A transaction recovery method supporting fine-granularity locking. ACM Trans. on Database Systems 17(1) (1992) 94–162
Borg, A., Blau, W., Graetsch, W., Herrmann, F., Oberle, W.: Fault Tolerance Under UNIX. ACM Transactions on Computer Systems 7(1) (1989) 1–24
Muller, G., Banatre, M., Peyrouze, N., Rochat, R.: Lessons from FTM: An Experiment in the Design & Implementation of a Low-Cost Fault-Tolerant System. IEEE Transactions on Reliability 45(2) (1996) 332–340
Elnozahy, E.N.M., Alvisi, L., Wang, Y.M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys 34(3) (September 2002) 375–408
Lin, J.L., Dunham, M.H.: A survey of distributed database checkpointing. Distributed and Parallel Databases 5(3) (1997) 289–319
Lin, J.L., Dunham, M.H.: A low-cost checkpointing technique for distributed databases. Distributed and Parallel Databases 10(3) (2001) 241–268
Jefferson, D.R.: Virtual time. ACM Transaction on Programming Languages and Systems 7(3) (July 1985) 404–425
Lin, Y., Lazowska, E.D.: A study of time warp rollback machanisms. ACM Transactions on Modeling and Computer Simulations 1(1) (January 1991) 51–72
Siewiorek, D.P., Swarz, R.S.: Reliable Computer Systems: Design and Evaluation. 3rd edn. A K Peters (1998)
Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kycyman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery-oriented computing (roc): Motivation, definition, techniques, and case studies. Technical report, UC Berkeley Computer Science (2002) CSD-02-1175.
Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: Proceedings of the Eighth IEEE HOTOS. (2001)
Swift, M.M., Bershad, B.N., Levy, H.M.: Improving the Reliability of Commodity Operating Systems. In: ACM SOSP. (2003)
Ammann, P., Jajodia, S., Mavuluri, P.: On the fly reading of entire databases. IEEE Trans. on Knowledge and Data Engineering 7(5) (October 1995) 834–838
Mohan, C., Pirahesh, H., Lorie, R.: Efficient and flexible methods for transient versioning of records to avoid locking by read-only trans. In: ACM SIGMOD International Conference on Management of Data, San Diego, CA (June 1992) 124–133
Pu, C.: On-the-fly, incremental, consistent reading of entire databases. Algorithmica 1(3) (October 1986) 271–287
Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, Inc. (1993)
Dasgupta, P., Leblanc, R., Appelbe, W.: The Clouds distributed operating system. In: Proceedings 8th International Conference on Distributed Computing Systems, San Jose, Calif. (2002)
Dixon, G.N., Barrington, G.D., Shrivastava, S., Wheater, S.M.: The treatment of persistent objects in Arjuna. Comput. J. 32(4) (1989)
Gheith, A., Schwan, K.: CHAOS: Support for real-time atomic transactions. In: Proc. 19th International Symposium on Fault-Tolerant Computing, Chicago (1989)
Liskov, B., Scheifler, R.: Guardians and actions: Linguistic support for robust, distributed programs. ACM Transactions on Program. Lang. Syst. 5(3) (1983)
Nett, E., Kaiser, J., Kroger, R.: Providing recoverability in a transaction oriented distributed operating system. In: Proc. 6th International Symposium on Fault-Tolerant Computing, Cambridge (May 1986)
Clark, B.E., Corrtgan, M.J.: Application System/400 performance characteristics. IBM Syst. J. 28(3) (1989)
Crus, R.: Data recovery in IBM Database 2. IBM Syst. J. 23(2) (1984)
Sql server. http://www.microsoft.com/sql/default.mspx
Oracle database. http://www.oracle.com/database/index.html
Db2 log analysis tool for z/os. http://www-306.ibm.com/software/data/db2imstools/db2tools/db2lat.html
Db2 recovery expert for multiplatforms. http://www-306.ibm.com/software/data/db2imstools/db2tools/db2re/
Oracle data protection and disaster recovery solutions. http://www.oracle.com/technology/deploy/availability/htdocs/OracleDR Solutions.html
Korth, H., Levy, E., Silberschatz, A.: A formal approach to recovery by compensating trans. In: the International Conference on Very Large Databases, Brisbane, Australia (1990) 95–106
Garcia-Molina, H.: Using semantic knowledge for transaction processing in a distributed database. ACM Trans. on Database Systems 8(2) (June 1983) 186–213
Garcia-Molina, H., Salem, K.: Sagas. In: ACM-SIGMOD International Conference on Management of Data, San Francisco, CA (1987) 249–259
Lomet, D.: MLR: A recovery method for multi-level systems. In: ACM-SIGMOD International Conference on Management of Data, San Diego, CA (June 1992) 185–194
Weikum, G., Hasse, C., Broessler, P., Muth, P.: Multi-level recovery. In: the Ninth ACM SIGACT-SIGMOD-SIGART Symposium of Principles of Database Systems, Nashville, Tenn (April 1990) 109–123
Weikum, G., Schek, H.J.: Concepts and applications of multilevel trans. and open nested trans. In Elmagarmid, A.K., ed.: Database Transaction Models for Advanced Applications. Morgan Kaufmann Publishers, Inc. (1992)
Gray, J., Helland, P., O’Neil, P., Shasha, S.: The dangers of replication and a solution. In: ACM SIGMOD. (1996)
Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys 22(4) (December 1990) 299–319
Berman, K., Cooper, R.: The ISIS Project: Real Experience with a Fault Tolerant Programming System. Operating Systems Review (1991) 103–107
CA data availability solutions. http://www3.ca.com/solutions/SubSolution.aspx?ID=312
Symantec livestate recovery products provide fast, reliable and cost-effective system and data recovery. http://www.symantec.com/press/2004/n041005.html
Sonasoft disaster recovery solutions. http://www.sonasoft.com/solutions/disaster.asp
Zhu, N., Chiueh, T.C.: Design, implementation, and evaluation of repairable file service. In: Proceedings of the IEEE Dependable Systems and Networks. (2003)
Goel, A., Po, K., Farhadi, K., Li, Z., Lara, E.D.: The Taser Intrusion Recovery System. In: ACM SOSP. (2005)
Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious trans. IEEE Trans. on Knowledge and Data Engineering 15(5) (2002) 1167–1185
Yu, M., Liu, P., Zang, W.: “Self Healing Workflow Systems under Attacks”. In: 24th IEEE Int’l Conf. on Distributed Computing Systems. (2004)
Lomet, D., Vagena, Z., Barga, R.: Recovery from Bad User Transactions. In: ACM SIGMOD. (2006)
Panda, B., Giordano, J.: Reconstructing the database after electronic attacks. In: the 12th IFIP 11.3 Working Conference on Database Security, Greece, Italy (July 1998)
Liu, P., Jing, J., Luenam, P., Wang, Y., Li, L., Ingsriswang, S.: “The Design and Implementation of a Self-Healing Database System”. J. of Intelligent Information Systems (JIIS) 23(3) (2004) 247–269
Pilania, D., Chiueh, T.: Design, Implementation, and Evaluation of an Intrusion Resilient Database System. In: Proc. International Conference on Data Engineering. (2005)
Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: Recovery from malicious trans. Distributed and Parallel Databases 8(1) (2000) 7–40
Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for intrusion tolerance. In: 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada (June 2001)
Ammann, P., Jajodia, S., McCollum, C., Blaustein, B.: Surviving information warfare attacks on databases. In: the IEEE Symposium on Security and Privacy, Oakland, CA (May 1997) 164–174
Liu, P., Jajodia, S., McCollum, C.: Intrusion confinement by isolation in information systems. J. of Computer Security 8(4) (2000) 243–279
Liu, P., Wang, H., Li, L.: Real-time Data Attack Isolation for Commercial Database Applications. Elsevier Journal of Network and Computer Applications 29(4) (2006) 294–320
Trivedi, K.S.: “Probability and statistics with reliability, queuing and computer science applications”. John Wiley and Sons (2002)
Wang, H., Liu, P.: Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. In: Proc. ESORICS (European Symposium on Research in Computer Security). (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC.
About this chapter
Cite this chapter
Liu, P., Jajodia, S., Yu, M. (2008). Damage Quarantine and Recovery in Data Processing Systems. In: Gertz, M., Jajodia, S. (eds) Handbook of Database Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48533-1_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-48533-1_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-48532-4
Online ISBN: 978-0-387-48533-1
eBook Packages: Computer ScienceComputer Science (R0)