Skip to main content

Succinct and Fast Accessible Data Structures for Database Damage Assessment

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3347))

Abstract

This paper presents methods for assessing damage in a database system after an attack is identified and a malicious transaction is detected. By using pre-developed data structures our protocols identify all affected transactions and also damaged data items without requiring any log access. These data structures are built using bit-vectors and are manipulated using logical AND and OR operations to achieve faster damage assessment.

This work has been supported in part by US AFOSR under grant F49620-01-10346.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ammann, P., Jajodia, S., McCollum, C.D., Blaustein, B.T.: Surviving Information Warfare Attacks on Databases. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (1997)

    Google Scholar 

  2. Barbara, D., Goel, R., Jajodia, S.: Mining Malicious Data Corruption with Hidden Markov Models. In: Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England (July 2002)

    Google Scholar 

  3. Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: Proceedings of the 2004 ACM Symposium on Applied Computing, Special Track on Database Theory, Technology, and Applications, Nicosia, Cyprus (March 2004)

    Google Scholar 

  4. Jajodia, S., McCollum, C.D., Amman, P.: Trusted Recovery. Communications of the ACM 42(7), 71–75 (1999)

    Article  Google Scholar 

  5. Lala, C., Panda, B.: Evaluating Damage from Cyber Attacks: A Model and Analysis. IEEE Transactions on System, Man, and Cybernetics – Part A: Systems and Humans 31(4) (July 2001)

    Google Scholar 

  6. Lee, V.C.S., Stankovic, J.A., Son, S.H.: Intrusion Detection in Real-time Database Systems Via Time Signatures. In: Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (2000)

    Google Scholar 

  7. Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: recovering from malicious transactions. Distributed and Parallel Database 8(1), 7–40 (2000)

    Article  Google Scholar 

  8. Panda, B., Yalamanchili, R.: Transaction Fusion in the Wake of Information Warfare. In: Proceedings of the 2001 ACM Symposium on Applied Computing, Special Track on Database Systems, Las Vegas, Nevada (March 2001)

    Google Scholar 

  9. Patnaik, S., Panda, B.: Dependency Based Logging for Database Survivability from hostile transactions. In: Proceedings of the 12th International Conference Computer Application and Industry Engineering, Atlanta, GA (November 1999)

    Google Scholar 

  10. Defending Americas Cyberspace: National plan for information system protection, version 1.0. The White House, Washington, DC (2000)

    Google Scholar 

  11. Zuo, Y., Panda, B.: Damage Assessment Models For Distributed Database Systems. In: Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Sitges, Spain, July 25-28 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, J., Panda, B., Hu, Y. (2004). Succinct and Fast Accessible Data Structures for Database Damage Assessment. In: Ghosh, R.K., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2004. Lecture Notes in Computer Science, vol 3347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30555-2_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30555-2_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24075-4

  • Online ISBN: 978-3-540-30555-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics