高级检索
    陈驰 冯登国 徐震. 数据库事务恢复日志和入侵响应模型研究[J]. 计算机研究与发展, 2010, 47(10): 1797-1804.
    引用本文: 陈驰 冯登国 徐震. 数据库事务恢复日志和入侵响应模型研究[J]. 计算机研究与发展, 2010, 47(10): 1797-1804.
    Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    Citation: Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.

    数据库事务恢复日志和入侵响应模型研究

    Research on Database Transaction Recovery Log and Intrusion Response

    • 摘要: 数据库日志记录数据元素的变迁历史,是维护数据库系统正确性和一致性的重要依据.现有的日志模式无法体现事务间依赖关系,系统在遭到恶意攻击时只得让所有数据元素恢复到出错点的状态,容忍入侵的能力差.提出一种新型的事务恢复日志模型,采用抽象状态机描述了日志生成规则和入侵响应模型,对事务之间的依赖关系进行了形式化的定义,并对入侵响应模型的完整性和正确性进行了分析.配置事务恢复日志和入侵响应机制的数据库系统在遭受攻击时,可以仅恢复受恶意事务影响的后继而无需回滚所有事务,从而提高了数据库系统的生存性.

       

      Abstract: Log is important to the database system, which is the foundation of maintaining the correctness and consistency. The existing database log mechanism only stores the history of transactions, but can not record the relationship between transactions. Facing the attack, databases with traditional log system can only stop the service of database and recover to the point of attack occurrence. This kind of recovery will abandon all the transactions after the malicious transaction regardless of whether these transactions are related to the malicious transaction. That means the database system is out of service between the fault-point to the end of recovery. By using this vulnerability, the attacker can commit malicious transactions constantly and the database will always be in the state of recovery. In this paper, we present a new model of transaction recovery log and intrusion response. We use ASM to describe the model, give a formal definition of transaction dependency and prove the correctness and categoricalness of the model. Databases with transaction recovery log and intrusion response mechanism roll back only affected transactions rather than all the transactions after malicious attack. This method will not stop the service of the database system, significantly enhancing the performance of recovery for defensive information warfare.

       

    /

    返回文章
    返回