Sciweavers

ACSAC
2007
IEEE

Database Isolation and Filtering against Data Corruption Attacks

14 years 5 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becoming more and more sophisticated to detect such attacks. However, more advanced detection techniques require more complicated analyses, e.g, sequential analysis, which incurs detection latency. If we have an intrusion detection system as a filter for all system inputs, we will introduce a uniform processing latency to all transactions of the database system. In this paper, we propose to use a “unsafe zone” to isolate user’s SQL queries from a “safe zone” of the database. In the unsafe zone, we use polyinstantiations and flags for the records to provide an immediate but different view from that of the safe zone to the user. Such isolation has negligible processing latency from the user’s view, while it can significantly improve the integrity level of the whole database system and reduce the recove...
Meng Yu, Wanyu Zang, Peng Liu
Added 02 Jun 2010
Updated 02 Jun 2010
Type Conference
Year 2007
Where ACSAC
Authors Meng Yu, Wanyu Zang, Peng Liu
Comments (0)