Surviving information warfare attacks on databases

We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be violated, but data is nonetheless available to support mission objectives. We define a notion of consistency suitable for databases in which some information is known to be damaged, and other information is known to be only partially repaired. We present a protocol for normal transactions with respect to the damage markings and show that consistency preserving normal transactions maintain database consistency in the presence of damage. We present an algorithm for taking consistent snapshots of databases under attack. The snapshot algorithm has the virtue of not interfering with countermeasure transactions.

[1]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[2]  Hermann Kopetz,et al.  Fault tolerance, principles and practice , 1990 .

[3]  David Mattox Indeed: an active database for concurrent engineering , 1994 .

[4]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Jennifer Widom,et al.  Active Database Systems , 1995, Modern Database Systems.

[6]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[7]  Nancy G. Leveson,et al.  Safeware: System Safety and Computers , 1995 .

[8]  Sushil Jajodia,et al.  On-The-Fly Reading of Entire Databases , 1995, IEEE Trans. Knowl. Data Eng..

[9]  Calton Pu,et al.  Performance Evaluation of Global Reading of Entire Databases , 1988, Proceedings [1988] International Symposium on Databases in Parallel and Distributed Systems.

[10]  Michael Reinfrank,et al.  Truth Maintenance Systems , 1990, Lecture Notes in Computer Science.

[11]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[12]  Abraham Silberschatz,et al.  Database System Concepts , 1980 .

[13]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[14]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[15]  Kenneth D. Forbus,et al.  Building Problem Solvers , 1993 .

[16]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..