Application-level isolation to cope with malicious database users

Sushil Jajodia, Peng Liu, Catherine D. McCollum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. The capacity of these techniques, however is limited: innocent users may be mistaken for malicious ones while malicious users stay at large. Isolation is a method that has been applied to protect systems from damage while investigating further. This paper proposes the use of isolation at an application level to gain its benefits while minimizing loss of resources and productive work in the case of incidents later deemed innocent. We describe our scheme in the database context. It isolates the database transparently from further damage by users suspected to be malicious, while still maintaining continued availability for their transactions. Isolation is complicated by the inconsistencies that may develop between isolated database versions. We present both static and dynamic approaches to identify and resolve conflicts. Finally, we give several examples of applications in which the isolation scheme should be worthwhile and be able to achieve good performance.

Original languageEnglish (US)
Title of host publicationProceedings - 14th Annual Computer Security Applications Conference, ACSAC 1998
PublisherAssociation for Computing Machinery
Pages73-82
Number of pages10
ISBN (Electronic)0818687894, 9780818687891
DOIs
StatePublished - 1998
Event14th Annual Computer Security Applications Conference, ACSAC 1998 - Phoenix, United States
Duration: Dec 7 1998Dec 11 1998

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Other

Other14th Annual Computer Security Applications Conference, ACSAC 1998
Country/TerritoryUnited States
CityPhoenix
Period12/7/9812/11/98

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Application-level isolation to cope with malicious database users'. Together they form a unique fingerprint.

Cite this