Data-base malevolence transaction method and system thereof

A transaction processing and database technology, applied in the field of enhancing database system security, can solve problems such as low response efficiency and weak attack security, and achieve the effect of ensuring correctness and availability

Inactive Publication Date: 2008-04-09
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problem of weak security and low response efficiency of the existing database system in the face of malicious transaction attacks, the present invention provides a method and system for processing malicious transactions in the database system. When the intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data-base malevolence transaction method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be described in further detail below with reference to the accompanying drawings and an example, but the scope of the present invention is not limited in any way.

[0055] In this example, it is assumed that the database only includes 5 data elements, and the value of each data element in the initial state is 2:

[0056] Data Element Identifier

[0057] Assume that the user submits four transactions to the database through the database management system: T1, T2, T3 and T4, and each transaction performs the following operations, as listed in the following table:

[0058] transaction ID

[0059] As shown in Figure 2, the database generates four transaction recovery log records for the above four transactions respectively. The transaction recovery log libraries are listed below:

[0060] transaction ID

[0061] Assume that at time 2007-10-26, 12:04, the intrusion detection component detects that T1 is an original ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method of malicious affairs of a database system and a system thereof, aiming at the problem that the security is weak and the response efficiency is low when the prior database system faces the attack of the malicious affairs. An affair restoration log system independent of the original log system of the database is set, the executing history of affairs is recorded in the unit of an affair when the affair is submitted, and then the legality of the submitted affair is determined on the basis of the content recorded by the affair restoration log; when an invading malicious affair is detected, all the data affected by the malicious affair are searched by retrieving the affair restoration log and are restored, and the operation result of the unaffected affairs remains, thereby ensuring accuracy and usability of the database system. The after-set processing mode of the method and the system can limit the efficiency derating in an acceptable range, ensuring the timely response of the database system to a user's request.

Description

technical field [0001] The present invention mainly relates to a method and a system for enhancing the security of a database system, and more precisely relates to a method and a system for ensuring data correctness after an attacker bypasses an intrusion prevention component of the database system. Background technique [0002] With the increase in the demand for information sharing, the application of the upper layer of the database continues to expand, and the attack methods of the attackers have become diversified. The database system responsible for storing and managing sensitive information is facing more and more threats. It is difficult to guarantee the database security only through preventive measures. The system provides uninterrupted service. A high-security system should have the ability to detect intrusions and automatically restore to a normal state. The general process of intrusion prevention for high-security data systems is: protection→detection→error limi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F17/30
Inventor 陈驰冯登国徐震张敏咸鹤群张德胜张颖君洪澄
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products