Extended data dependency approach: a robust way of rebuilding database

Attack on information systems through electronic media has become epidemic with the explosion of Internet technologies and their applications. It is vital to start the assessment and recovery efforts immediately after an attack is detected. In this research, we consider dependency among data items to assess the damage. But the existing data dependency method is extremely limited. Therefore, in this paper, we have provided the theory and concepts needed to make this approach more robust and general. These include: classifications of read and write operations, a new definition of transaction and a new representation of the scheduler. Based on this developed theory, we have proposed an algorithm for damage assessment and recovery in a database that has suffered from information attack.

[1]  Brajendra Panda,et al.  Data dependency based logging for defensive information warfare , 2000, SAC '00.

[2]  Sushil Jajodia,et al.  Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.

[3]  Brajendra Panda,et al.  Reorganization of Database Log for Information Warfare Data Recovery , 2001, DBSec.

[4]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[5]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[6]  David S Alberts,et al.  Defensive Information Warfare , 1996 .

[7]  Teresa F. Lunt,et al.  Knowledge-based intrusion detection , 1989, [1989] Proceedings. The Annual AI Systems in Government Conference.

[8]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[9]  Brajendra Panda,et al.  Reconstructing the Database after Electronic Attacks , 1998, DBSec.