【24h】

Research on Malicious Transaction Processing Method of Database System

机译:数据库系统的恶意交易处理方法研究

获取原文

摘要

Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions.A few existing methods developed for this purpose rely on operation logs, which can't express the dependency between different transactions directly.These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack.Hence, it's necessary to find out the malicious transaction and subsequent transactions depending on it precisely.In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions' dependency directly.Based on the log model and the algorithm for log's creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct.Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.
机译:从信息攻击中恢复很困难,因为DBMS并非旨在处理恶意提交的事务,为此目的开发的一些现有方法依赖于操作日志,而操作日志无法直接表示不同事务之间的依赖关系,这些方法通常使用回滚机制和放弃无辜交易的结果以保持正确性,可以确实地将其用作实现DOS攻击的一种方法。因此,有必要准确地找出恶意交易及其后续交易。提出并记录每个日志项在一个事务中采取的动作,从而可以直接计算事务的依赖关系。基于日志模型和日志创建算法,研究了依赖关系计算和数据恢复算法,并进行了证明。完整而正确。使用事务恢复日志和算法,数据库系统ca n大大提高了防御性信息战的恢复性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号