期刊文献+

数据库事务恢复日志和入侵响应模型研究 被引量:4

Research on Database Transaction Recovery Log and Intrusion Response
在线阅读 下载PDF
导出
摘要 数据库日志记录数据元素的变迁历史,是维护数据库系统正确性和一致性的重要依据.现有的日志模式无法体现事务间依赖关系,系统在遭到恶意攻击时只得让所有数据元素恢复到出错点的状态,容忍入侵的能力差.提出一种新型的事务恢复日志模型,采用抽象状态机描述了日志生成规则和入侵响应模型,对事务之间的依赖关系进行了形式化的定义,并对入侵响应模型的完整性和正确性进行了分析.配置事务恢复日志和入侵响应机制的数据库系统在遭受攻击时,可以仅恢复受恶意事务影响的后继而无需回滚所有事务,从而提高了数据库系统的生存性. Log is important to the database system,which is the foundation of maintaining the correctness and consistency.The existing database log mechanism only stores the history of transactions,but can not record the relationship between transactions.Facing the attack,databases with traditional log system can only stop the service of database and recover to the point of attack occurrence.This kind of recovery will abandon all the transactions after the malicious transaction regardless of whether these transactions are related to the malicious transaction.That means the database system is out of service between the fault-point to the end of recovery.By using this vulnerability,the attacker can commit malicious transactions constantly and the database will always be in the state of recovery.In this paper,we present a new model of transaction recovery log and intrusion response.We use ASM to describe the model,give a formal definition of transaction dependency and prove the correctness and categoricalness of the model.Databases with transaction recovery log and intrusion response mechanism roll back only affected transactions rather than all the transactions after malicious attack.This method will not stop the service of the database system,significantly enhancing the performance of recovery for defensive information warfare.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第10期1797-1804,共8页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2007AA120404 2007AA120405) 中国科学院知识创新工程领域前沿项目(ISCAS2009-DR13) 国家自然科学基金项目(61003228)~~
关键词 入侵容忍 事务恢复日志 入侵响应 事务依赖 恶意事务 intrusion tolerance transaction recovery log intrusion response transaction dependence malicious transaction
作者简介 (chenchi@is.iscas.ac.cn)陈驰,1978年生,博士,助理研究员,主要研究方向为网络与系统安全. 冯登国,1965年生,博士,研究员,博士生导师,主要研究方向为密码学与信息安全. 徐震,1976年生,博士,副研究员,主要研究方向为网络与系统安全.
  • 相关文献

参考文献19

二级参考文献115

  • 1..http://www. sans. org/newlook/resources/glossary. htm,1999.
  • 2[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 3[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 4[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 5[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.
  • 6[1]Lowe G. Breaking and Fixing the Needham Schroeder Public-key Protocol using FDR. In: Margaria, Steffen(Eds. ): Tools and Algorithms for the Construction and Analysis of Systems. LNCS 1055, 1996. 147~166
  • 7[2]Gurevich Y. Sequential Abstract State Machines Capture Sequential Algorithms. ACM Tansactions on Computational logic, 2000, 1 (1):77~111
  • 8[3]Gurevich Y. Evolving Algebra 1993:Lipari Guide. Specification and Validation Methods. Oxford UniversityPress, 1995.9~36
  • 9[4]Gurevich Y. May 1997 Draft of the ASM Guide. Technical Report CSE-TR-336-97. University of Michigin, EECS Department. 1997
  • 10[5]G Bella, E Riccobene. A Realistic Environment for Crypto-Protocol Analyses by ASMs. In:Germany U Glasser ed. Proc of INFOR MATIK’98,5th International Workshop on Abstract State Machines. Magdeburg, 1998. 127~ 138

共引文献116

同被引文献23

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部