首页> 外文会议>IEEE Symposium on Security and Privacy >Surviving information warfare attacks on databases
【24h】

Surviving information warfare attacks on databases

机译:幸存信息战争攻击数据库

获取原文

摘要

We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be violated, but data is nonetheless available to support mission objectives. We define a notion of consistency suitable for databases in which some information is known to be damaged, and other information is known to be only partially repaired. We present a protocol for normal transactions with respect to the damage markings and show that consistency preserving normal transactions maintain database consistency in the presence of damage. We present an algorithm for taking consistent snapshots of databases under attack. The snapshot algorithm has the virtue of not interfering with countermeasure transactions.
机译:我们考虑幸存信息战争攻击数据库的问题。我们采用了攻击的不同阶段的容错方法。为了维持有关攻击的精确信息,我们标记数据以反映检测到的损坏的严重程度以及损坏数据已修复的程度。在部分修复数据的情况下,可能会违反完整性约束,但数据仍然可用于支持任务目标。我们定义了适合于已知一些信息损坏的数据库的一致性的概念,并且已知仅部分信息仅部分修复。我们为损坏标记提供了一个正常交易的协议,并显示了保持正常交易的一致性在存在损坏时维持数据库一致性。我们提出了一种算法,用于在攻击中拍摄一致的数据库快照。快照算法具有不干扰对策事务的优点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号