Abstract
A database log is the primary resource for damage assessment and recovery after an electronic attack. The log is a sequential file stored in the secondary storage and it can grow to humongous proportions in course of time. Disk I/O speed dictates how fast damage assessment and recovery can be done. To make the process of damage assessment and recovery more efficient, segmenting the log based on different criteria has been proposed before. But the trade off is that, either segmenting the log involves a lot of computation or damage assessment is a complicated process. In this research we propose to strike a balance. We propose a hybrid log segmentation method that will reduce the time taken to perform damage assessment while still segmenting the log fast enough so that no intricate computation is necessary. While performing damage assessment, we re-segment the log based on transaction dependency. Thus during repeated damage assessment procedures, we create new segments with dependent transactions in them so that the process of damage assessment becomes faster when there are repeated attacks on the system.
Chapter PDF
Similar content being viewed by others
References
P. Amman, S. Jajodia, C. D. McCollum, and B. Blaustein, Surviving Information Warfare Attacks on Databases, Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
P.A. Bernstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems, Addison-Wesley, 1987.
R. Elmasri and S. B. Navathe, Fundamentals of Database Systems, Third Edition, Addison-Wesley, 2000.
S. Jajodia, C. D. McCollum, and P. Amman, Trusted Recovery, Communications of the ACM, 42(7), pp. 71–75, July 1999.
H. F. Korth, A. Silberschatz, and S. Sudarshan, Database System Concepts, Third Edition, McGraw-Hill International Edition, 1997
P. Liu, P. Ammann, and S. Jajodia, Rewriting Histories: Recovering from Malicious Transactions, Distributed and Parallel Databases, 8(1), pp. 7–40, January 2000.
P. Liu and X. Hao, Efficient Damage Assessment and Repair in Resilient Distributed Database Systems, Proceedings of the 15th Annual IFIP WG 11.3 Conference on Database and Application Security, July 2001.
B. Panda and S. Patnaik, A Recovery Model for Defensive Information Warfare, Proceedings of the 9 th International Conference on Management of Data, p. 359–368, Hyderabad, India, December 1998.
B. Panda and J. Giordano, Reconstructing the Database After Electronic Attacks, Database Security XII: Status and Prospects, S. Jajodia (editor), Kluwer Academic Publishers, 1999.
B. Panda and S. Tripathy, Data Dependency Logging for Defensive Information Warfare, Proceedings of the 2000 ACM Symposium on Applied Computing, p. 361–365, Como, Italy, March 2000.
P. Ragothaman, and B. Panda, Modeling and Analyzing Transaction Logging Protocols for Effective Damage Assessment, Research Directions in Data and Applications Security, E. Gudes and S. Shenoi (editors), Kluwer Academic Publishers, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Ragothaman, P., Panda, B. (2004). Improving Damage Assessment Efficacy in Case of Frequent Attacks on Databases. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds) Data and Applications Security XVII. IFIP International Federation for Information Processing, vol 142. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8070-0_2
Download citation
DOI: https://doi.org/10.1007/1-4020-8070-0_2
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8069-2
Online ISBN: 978-1-4020-8070-8
eBook Packages: Springer Book Archive