Abstract
This paper presents methods for assessing damage in a database system after an attack is identified and a malicious transaction is detected. By using pre-developed data structures our protocols identify all affected transactions and also damaged data items without requiring any log access. These data structures are built using bit-vectors and are manipulated using logical AND and OR operations to achieve faster damage assessment.
This work has been supported in part by US AFOSR under grant F49620-01-10346.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ammann, P., Jajodia, S., McCollum, C.D., Blaustein, B.T.: Surviving Information Warfare Attacks on Databases. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (1997)
Barbara, D., Goel, R., Jajodia, S.: Mining Malicious Data Corruption with Hidden Markov Models. In: Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England (July 2002)
Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: Proceedings of the 2004 ACM Symposium on Applied Computing, Special Track on Database Theory, Technology, and Applications, Nicosia, Cyprus (March 2004)
Jajodia, S., McCollum, C.D., Amman, P.: Trusted Recovery. Communications of the ACM 42(7), 71–75 (1999)
Lala, C., Panda, B.: Evaluating Damage from Cyber Attacks: A Model and Analysis. IEEE Transactions on System, Man, and Cybernetics – Part A: Systems and Humans 31(4) (July 2001)
Lee, V.C.S., Stankovic, J.A., Son, S.H.: Intrusion Detection in Real-time Database Systems Via Time Signatures. In: Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (2000)
Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: recovering from malicious transactions. Distributed and Parallel Database 8(1), 7–40 (2000)
Panda, B., Yalamanchili, R.: Transaction Fusion in the Wake of Information Warfare. In: Proceedings of the 2001 ACM Symposium on Applied Computing, Special Track on Database Systems, Las Vegas, Nevada (March 2001)
Patnaik, S., Panda, B.: Dependency Based Logging for Database Survivability from hostile transactions. In: Proceedings of the 12th International Conference Computer Application and Industry Engineering, Atlanta, GA (November 1999)
Defending Americas Cyberspace: National plan for information system protection, version 1.0. The White House, Washington, DC (2000)
Zuo, Y., Panda, B.: Damage Assessment Models For Distributed Database Systems. In: Proceedings of the 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Sitges, Spain, July 25-28 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, J., Panda, B., Hu, Y. (2004). Succinct and Fast Accessible Data Structures for Database Damage Assessment. In: Ghosh, R.K., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2004. Lecture Notes in Computer Science, vol 3347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30555-2_49
Download citation
DOI: https://doi.org/10.1007/978-3-540-30555-2_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24075-4
Online ISBN: 978-3-540-30555-2
eBook Packages: Computer ScienceComputer Science (R0)