Accession Number:

ADA394732

Title:

Trusted Recovery from Information Attacks

Descriptive Note:

Final rept Mar 1997-Mar 1999

Corporate Author:

GEORGE MASON UNIV FAIRFAX VA

Personal Author(s):

Report Date:

2001-08-01

Pagination or Media Count:

114.0

Abstract:

Preventive measures sometimes fail to deflect malicious attacks. In this work, we adopt an information warfare perspective which assumes success by the attacker in achieving partial, but not complete damage. in particular, we work in the database context and consider recovery form malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. recovery is complicated by the presence of benign transactions that depend, directly or indirectly, on the malicious transactions. We present recovery models to restore only the damaged part of the database. Two families of new repair algorithms are developed one is a set of dependency-graph based algorithms, the other is a set of algorithms that do repair via rewriting histories.

Subject Categories:

  • Computer Systems Management and Standards
  • Countermeasures

Distribution Statement:

APPROVED FOR PUBLIC RELEASE