首页> 外文会议>International Conference on Web-Age Information Management >Research on Malicious Transaction Processing Method of Database System
【24h】

Research on Malicious Transaction Processing Method of Database System

机译:数据库系统恶意事务处理方法研究

获取原文

摘要

Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions. A few existing methods developed for this purpose rely on operation logs, which can't express the dependency between different transactions directly. These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack. Hence, it's necessary to find out the malicious transaction and subsequent transactions depending on it precisely. In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions' dependency directly. Based on the log model and the algorithm for log's creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct. Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.
机译:从信息攻击中恢复很困难,因为DBMS不设计用于处理恶意提交的事务。为此目的开发的一些现有方法依赖于操作日志,这不能直接表达不同事务之间的依赖性。这些方法通常使用回滚机制并放弃无辜交易的结果来保持正确性,这确实可以用作实现DOS攻击的方法。因此,有必要确定恶意交易和随后的交易,具体取决于它。在本文中,呈现了事务恢复日志的定义,每个日志项记录在一个事务中所采取的操作,通过,我们可以直接计算事务的依赖项。基于日志模型和日志创建算法,研究了依赖性计算和数据恢复算法,该算法是完整且正确的。使用事务恢复日志和算法,数据库系统可以显着提高防御信息战的恢复性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号