2009
DOI: 10.1007/s10207-009-0095-0
|View full text |Cite
|
Sign up to set email alerts
|

A column dependency-based approach for static and dynamic recovery of databases from malicious transactions

Abstract: Even state of the art database protection mechanisms often fail to prevent occurrence of malicious attacks. Since in a database environment, the modifications made by one transaction may affect the execution of some of the later transactions, it leads to spreading of the damage caused by malicious (bad) transactions. Following traditional log-based recovery schemes, one can rollback (undo) the effect of all the transactions, both malicious as well as non-malicious. In such a scenario, even the unaffected trans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“… When the DIDS is unable to prevent the execution of intrusive actions, it should consider the execution of a recovery-from-attack type solution, such as [3];…”
Section: Discussionmentioning
confidence: 99%
“… When the DIDS is unable to prevent the execution of intrusive actions, it should consider the execution of a recovery-from-attack type solution, such as [3];…”
Section: Discussionmentioning
confidence: 99%
“…Other systems use these features and add encryption techniques for distributing storage [25]. Architectures for damage assessment and self-healing databases have also been proposed [9,11,12,23,24]. Although strongly effective for availability purposes, data replication techniques are always an important issue in DWs, given the volume of data and storage size typically involved.…”
Section: B Reactive Data Security Solutionsmentioning
confidence: 98%
“…The algorithm will examine the next transaction in the log file, which is T 2 . Since T 2 is an updating transaction, it will be added into the DA Table. Consequently, every reading (K, 6) (K,3), (fog 1 .T 3 .G, 3) T 10 (M, 16) (M, 10), (K, 6) T 14 (N, 31) (L, 4), (fog 1 .T 7 .D, 27) T 16 (P, 43) (fog 1 .T 11 .E, 43)…”
Section: E An Examplementioning
confidence: 99%