Database isolation and filtering against data corruption attacks

Meng Yu, Wanyu Zang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becoming more and more sophisticated to detect such attacks. However, more advanced detection techniques require more complicated analyses, e.g, sequential analysis, which incurs detection latency. If we have an intrusion detection system as a filter for all system inputs, we will introduce a uniform processing latency to all transactions of the database system. In this paper, we propose to use a "unsafe zone" to isolate user's SQL queries from a "safe zone" of the database. In the unsafe zone, we use polyinstantiations and flags for the records to provide an immediate but different view from that of the safe zone to the user. Such isolation has negligible processing latency from the user's view, while it can significantly improve the integrity level of the whole database system and reduce the recovery costs. Our techniques provide different integrity levels within different zones. Both our analytical and experimental results confirm the effectiveness of our isolation techniques against data corruption attacks to the databases. Our techniques can be applied to database systems to provide multizone isolations with different levels of QoS.

Original languageEnglish (US)
Title of host publicationProceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007
Pages97-106
Number of pages10
DOIs
StatePublished - Dec 1 2007
Event23rd Annual Computer Security Applications Conference, ACSAC 2007 - Miami Beach, FL, United States
Duration: Dec 10 2007Dec 14 2007

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Other

Other23rd Annual Computer Security Applications Conference, ACSAC 2007
CountryUnited States
CityMiami Beach, FL
Period12/10/0712/14/07

All Science Journal Classification (ASJC) codes

  • Software
  • Engineering(all)

Fingerprint Dive into the research topics of 'Database isolation and filtering against data corruption attacks'. Together they form a unique fingerprint.

  • Cite this

    Yu, M., Zang, W., & Liu, P. (2007). Database isolation and filtering against data corruption attacks. In Proceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007 (pp. 97-106). [4412980] (Proceedings - Annual Computer Security Applications Conference, ACSAC). https://doi.org/10.1109/ACSAC.2007.18