Featured Research

from universities, journals, and other organizations

Databases Can Heal Themselves On-The-Fly

Date:
October 31, 2002
Source:
Penn State
Summary:
An innovative new software can detect and correct a database impaired by an attack while the database system continues to process transactions, says a Penn State researcher.

An innovative new software can detect and correct a database impaired by an attack while the database system continues to process transactions, says a Penn State researcher.

"We simulated attackers' behaviors on a database and then monitored the response of the database," said Dr. Peng Liu, assistant professor of information sciences and technology. "We can't prevent attackers from getting in, but with this technology, the database can heal itself on-the-fly."

Liu performed the research underlying the technology while a faculty member at the University of Maryland – Baltimore County. He has since established his research team, the Cyber Security Group, in Penn State's School of Information Sciences and Technology. The team's areas of expertise include network security, intrusion detection and masking, survivable systems and attack prediction.

All databases are vulnerable to being breached by unauthorized users, former employees or hackers looking for a challenge. With more databases than ever, experts expect the number of database attacks to continue to rise. That leaves at risk such data-intensive applications as e-commerce, air traffic control, command-and-control, and credit card billing systems.

Although many intrusions can be detected soon after the database is breached, the damage usually doesn't stop with the initial transaction. Subsequent transactions and data updating can spread the damage.

Existing recovery software creates its own problems. Rolling back activity to the initial damage is expensive because the work of many unaffected transactions by good users will be lost, Liu said. Second, for commercial databases, suspending the database to clean up the damage is undesirable, and in many cases, unacceptable. International banks, for instance, need 24-7 access to account data.

The family of algorithms developed by Liu and others can detect single, multiple or simultaneous attacks. But it does more. It isolates malicious transactions, so that many benign ones are preserved from being affected and having to be re-executed. It also repairs the database by containing the set of corrupted data objects and then, by undoing or unwinding the direct and indirect effects of the attack.

The technology has another advantage: The software can be adapted for static and on-the-fly repairs. Because it's dynamic, new transactions can continue even while the database is being repaired. Furthermore, the new technology is intelligent and adaptive.

"The database can adapt its own behavior and reconfigure itself based on the attack," Liu said.

A prototype of this attack-resilient software is being tested by the Cyber Security Group and the U.S. Air Force.

Liu's research was funded by the Air Force and the Defense Advanced Research Projects Agency. Subsequent grants have come from the National Science Foundation, the Air Force, DARPA and the U.S. Department of Energy.

The Penn State researcher and his co-authors, Paul Ammann and Sushil Jajodia, both of George Mason University, published their findings in the paper, "Recovery From Malicious Transactions," in the September issue of IEEE Transactions on Knowledge and Data Engineering.


Story Source:

The above story is based on materials provided by Penn State. Note: Materials may be edited for content and length.


Cite This Page:

Penn State. "Databases Can Heal Themselves On-The-Fly." ScienceDaily. ScienceDaily, 31 October 2002. <www.sciencedaily.com/releases/2002/10/021031074211.htm>.
Penn State. (2002, October 31). Databases Can Heal Themselves On-The-Fly. ScienceDaily. Retrieved September 21, 2014 from www.sciencedaily.com/releases/2002/10/021031074211.htm
Penn State. "Databases Can Heal Themselves On-The-Fly." ScienceDaily. www.sciencedaily.com/releases/2002/10/021031074211.htm (accessed September 21, 2014).

Share This



More Computers & Math News

Sunday, September 21, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

What This MIT Sensor Could Mean For The Future Of Robotics

What This MIT Sensor Could Mean For The Future Of Robotics

Newsy (Sep. 20, 2014) MIT researchers developed a light-based sensor that gives robots 100 times the sensitivity of a human finger, allowing for "unprecedented dexterity." Video provided by Newsy
Powered by NewsLook.com
Oculus Reveals New Virtual Reality Headset Prototype

Oculus Reveals New Virtual Reality Headset Prototype

Newsy (Sep. 20, 2014) Oculus announced a new virtual reality headset prototype Saturday, saying the product is close to being ready for consumers. Video provided by Newsy
Powered by NewsLook.com
How To Protect Your Data In The Still-Vulnerable iOS 8

How To Protect Your Data In The Still-Vulnerable iOS 8

Newsy (Sep. 20, 2014) One security researcher says despite Apple's efforts to increase security in iOS 8, it's still vulnerable to law enforcement data-transfer techniques. Video provided by Newsy
Powered by NewsLook.com
How Much Privacy Protection Will Google's Android L Provide?

How Much Privacy Protection Will Google's Android L Provide?

Newsy (Sep. 19, 2014) Google's local encryption will make it harder for law enforcement or malicious actors to access the contents of devices running Android L. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins