Loading…

Portable intrusion-resilient database management server

An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious...

Full description

Saved in:
Bibliographic Details
Main Authors: Smirnov, A., Lam, L., Chiueh, T.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 3192 Vol. 5
container_issue
container_start_page 3186
container_title
container_volume
creator Smirnov, A.
Lam, L.
Chiueh, T.
description An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs, PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.
doi_str_mv 10.1109/MILCOM.2005.1606147
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1606147</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1606147</ieee_id><sourcerecordid>1606147</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-531e32ed372d48a64c8074f2116d3d338b05c15e75d3f47cc5612303e19e3933</originalsourceid><addsrcrecordid>eNo9T8tqwzAQFH1AQ-ovyMU_4HRXaz18LKaPgEN6yD0o1rqo2E6R3EL_vi4NYQYGZmCYEWKFsEaE6mG7aerddi0B1Bo1aCzNlVhIVKowyuprkVXGwkyqZuibS2bsnchS-gAAlFbLChfCvJ3i5I4952Gc4lcKp7GInEIfeJxy7-bMJc4HN7p3Hv68xPGb47247VyfODvrUuyfn_b1a9HsXjb1Y1MENGoqFCGTZE9G-tI6XbbzsrKTiNqTJ7JHUC0qNspTV5q2VRolATFWPI-npVj91wZmPnzGMLj4czi_pl8nVkiy</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Portable intrusion-resilient database management server</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Smirnov, A. ; Lam, L. ; Chiueh, T.</creator><creatorcontrib>Smirnov, A. ; Lam, L. ; Chiueh, T.</creatorcontrib><description>An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs, PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.</description><identifier>ISSN: 2155-7578</identifier><identifier>ISBN: 9780780393936</identifier><identifier>ISBN: 0780393937</identifier><identifier>EISSN: 2155-7586</identifier><identifier>DOI: 10.1109/MILCOM.2005.1606147</identifier><language>eng</language><publisher>IEEE</publisher><subject>Availability ; Computer errors ; Computer science ; Database systems ; File servers ; Hardware ; Humans ; Information systems ; Resilience ; Transaction databases</subject><ispartof>MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005, p.3186-3192 Vol. 5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1606147$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1606147$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Smirnov, A.</creatorcontrib><creatorcontrib>Lam, L.</creatorcontrib><creatorcontrib>Chiueh, T.</creatorcontrib><title>Portable intrusion-resilient database management server</title><title>MILCOM 2005 - 2005 IEEE Military Communications Conference</title><addtitle>MILCOM</addtitle><description>An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs, PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.</description><subject>Availability</subject><subject>Computer errors</subject><subject>Computer science</subject><subject>Database systems</subject><subject>File servers</subject><subject>Hardware</subject><subject>Humans</subject><subject>Information systems</subject><subject>Resilience</subject><subject>Transaction databases</subject><issn>2155-7578</issn><issn>2155-7586</issn><isbn>9780780393936</isbn><isbn>0780393937</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo9T8tqwzAQFH1AQ-ovyMU_4HRXaz18LKaPgEN6yD0o1rqo2E6R3EL_vi4NYQYGZmCYEWKFsEaE6mG7aerddi0B1Bo1aCzNlVhIVKowyuprkVXGwkyqZuibS2bsnchS-gAAlFbLChfCvJ3i5I4952Gc4lcKp7GInEIfeJxy7-bMJc4HN7p3Hv68xPGb47247VyfODvrUuyfn_b1a9HsXjb1Y1MENGoqFCGTZE9G-tI6XbbzsrKTiNqTJ7JHUC0qNspTV5q2VRolATFWPI-npVj91wZmPnzGMLj4czi_pl8nVkiy</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Smirnov, A.</creator><creator>Lam, L.</creator><creator>Chiueh, T.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2005</creationdate><title>Portable intrusion-resilient database management server</title><author>Smirnov, A. ; Lam, L. ; Chiueh, T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-531e32ed372d48a64c8074f2116d3d338b05c15e75d3f47cc5612303e19e3933</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Availability</topic><topic>Computer errors</topic><topic>Computer science</topic><topic>Database systems</topic><topic>File servers</topic><topic>Hardware</topic><topic>Humans</topic><topic>Information systems</topic><topic>Resilience</topic><topic>Transaction databases</topic><toplevel>online_resources</toplevel><creatorcontrib>Smirnov, A.</creatorcontrib><creatorcontrib>Lam, L.</creatorcontrib><creatorcontrib>Chiueh, T.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Smirnov, A.</au><au>Lam, L.</au><au>Chiueh, T.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Portable intrusion-resilient database management server</atitle><btitle>MILCOM 2005 - 2005 IEEE Military Communications Conference</btitle><stitle>MILCOM</stitle><date>2005</date><risdate>2005</risdate><spage>3186</spage><epage>3192 Vol. 5</epage><pages>3186-3192 Vol. 5</pages><issn>2155-7578</issn><eissn>2155-7586</eissn><isbn>9780780393936</isbn><isbn>0780393937</isbn><abstract>An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or human error. More specifically, an intrusion-resilient mechanism helps to quickly repair a database by nullifying the damage caused by malicious or erroneous transactions, while preserving the effects of unaffected legitimate transactions that take place between intrusions/errors and their detection. The goal of this project is to develop a portable implementation framework that can augment a commercial database management system with intrusion resilience without requiring any modifications to its internals. The intrusion resilience mechanism described in this paper significantly improves the availability of modern DBMSs by facilitating and sometimes even automating the post-intrusion damage repair process. In addition, it can be embodied in a reusable implementation framework, whose portability is demonstrated by its successful application to three different DBMSs, PostgreSQL, Oracle, and Sybase. Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.</abstract><pub>IEEE</pub><doi>10.1109/MILCOM.2005.1606147</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-7578
ispartof MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005, p.3186-3192 Vol. 5
issn 2155-7578
2155-7586
language eng
recordid cdi_ieee_primary_1606147
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Availability
Computer errors
Computer science
Database systems
File servers
Hardware
Humans
Information systems
Resilience
Transaction databases
title Portable intrusion-resilient database management server
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T22%3A04%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Portable%20intrusion-resilient%20database%20management%20server&rft.btitle=MILCOM%202005%20-%202005%20IEEE%20Military%20Communications%20Conference&rft.au=Smirnov,%20A.&rft.date=2005&rft.spage=3186&rft.epage=3192%20Vol.%205&rft.pages=3186-3192%20Vol.%205&rft.issn=2155-7578&rft.eissn=2155-7586&rft.isbn=9780780393936&rft.isbn_list=0780393937&rft_id=info:doi/10.1109/MILCOM.2005.1606147&rft_dat=%3Cieee_6IE%3E1606147%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-531e32ed372d48a64c8074f2116d3d338b05c15e75d3f47cc5612303e19e3933%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1606147&rfr_iscdi=true