Chi Chen, D. Feng, Min Zhang, De-sheng Zhang, He-qun Xian
{"title":"Research on Malicious Transaction Processing Method of Database System","authors":"Chi Chen, D. Feng, Min Zhang, De-sheng Zhang, He-qun Xian","doi":"10.1109/WAIM.2008.27","DOIUrl":null,"url":null,"abstract":"Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions. A few existing methods developed for this purpose rely on operation logs, which can't express the dependency between different transactions directly. These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack. Hence, it's necessary to find out the malicious transaction and subsequent transactions depending on it precisely. In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions' dependency directly. Based on the log model and the algorithm for log's creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct. Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.","PeriodicalId":217119,"journal":{"name":"2008 The Ninth International Conference on Web-Age Information Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Ninth International Conference on Web-Age Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAIM.2008.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions. A few existing methods developed for this purpose rely on operation logs, which can't express the dependency between different transactions directly. These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack. Hence, it's necessary to find out the malicious transaction and subsequent transactions depending on it precisely. In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions' dependency directly. Based on the log model and the algorithm for log's creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct. Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.