Towards database firewall: Mining the damage spreading patterns

Kun Bai, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent of insiders or vulnerabilities exploited by outsiders, data stored in a database can still be compromised. When the database is under an attack, rolling back and re-executing the damaged transactions are the most used mechanisms during system recovery. This kind of mechanism either stops (or greatly restricts) the database service during repair, which causes unacceptable availability loss or denial-of-service for mission critical applications, or may cause serious damage spreading during on-the-fly recovery where many clean data items are accidentally corrupted by legitimate new transactions. To resolve this dilemma, we devise a novel mechanism, called database firewall in this paper. This firewall is designed to protect good data from being corrupted due to damage spreading. Pattern mining and Bayesian network techniques are adopted in the framework to mine frequent damage spreading patterns and to predict the data integrity in the face of attack. Our approach provides a probability based strategy to estimate the data integrity on the fly. With this feature, the database firewall is able to enforce a policy of transaction filtering to dynamically filter out the potential spreading transactions.

Original languageEnglish (US)
Title of host publicationProceedings - Annual Computer Security Applications Conference, ACSAC
Pages449-459
Number of pages11
DOIs
StatePublished - 2006
Event22nd Annual Computer Security Applications Conference, ACSAC 2006 - Miami Beach, FL, United States
Duration: Dec 11 2006Dec 15 2006

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Other

Other22nd Annual Computer Security Applications Conference, ACSAC 2006
CountryUnited States
CityMiami Beach, FL
Period12/11/0612/15/06

All Science Journal Classification (ASJC) codes

  • Software
  • Engineering(all)

Fingerprint Dive into the research topics of 'Towards database firewall: Mining the damage spreading patterns'. Together they form a unique fingerprint.

Cite this