会议专题

Research on Malicious Transaction Processing Method of Database System

Recovery from information attacks is difficult because DBMS is not designed to deal with malicious committed transactions.A few existing methods developed for this purpose rely on operation logs, which cant express the dependency between different transactions directly.These methods usually use rollback mechanism and abandon results of innocent transactions to maintain correctness, which may indeed be used as an approach to realize DOS attack.Hence, its necessary to find out the malicious transaction and subsequent transactions depending on it precisely.In this paper, the definition of transaction recovery log is presented and each log item records the actions taken in one transaction, by which, we can calculate transactions dependency directly.Based on the log model and the algorithm for logs creation, the dependency calculation and data recovery algorithm are studied, which are proofed to be complete and correct.Using transaction recovery log and the algorithm, database system can significantly enhance the performance of recovery for defensive information warfare.

Chen Chi Feng Deng-guo Zhang Min Zhang De-sheng Xian He-qun

State Key Laboratory of Information Security (Institute of Software of Chinese Academy of Sciences),Beijing,China 100080

国际会议

The Ninth International Conference on Web-Age Information Management(第九届web时代信息管理国际会议)(WAIM 2008)

张家界

英文

2008-07-20(万方平台首次上网日期,不代表论文的发表时间)