Using Checksums to Detect Data Corruption
نویسندگان
چکیده
In this paper, we consider the problem of malicious and intended corruption of data in a database, acting outside of the scope of the database management system. Although detecting an attacker who changes a set of database values at the disk level is a simple task (achievable by attaching signatures to each block of data), a more sophisticated attacker may corrupt the data by replacing the current data with copies of old block images, compromising the integrity of the data. To prevent successful completion of this attack, we provide a defense mechanism that enormously increases the intruders workload, yet maintains a low system cost during an authorized update. Our algorithm calculates and maintains two levels of signatures (checksum values) on blocks of data. The signatures are grouped in a manner that forces an extended series of block copying for any unauthorized update. Using the available information on block sizes, block reference patterns and amount of concurrently active transactions in the database, we calculate the length of this chain of copying, proving that the intruder has to perform a lot of work in order to go undetected. Therefore, our technique makes this type of attack very unlikely. Previous work has not addressed protection methods against this knowledgeable and equipped intruder who is operating outside the database management system.
منابع مشابه
Enhancing File System Integrity Through Checksums
Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Also in operating systems like Unix that allow a user to bypass the file system to access the raw disk, integrity checks not only detect data corruption, but also track malicious attacks. Checksumming is a common way of ensuring data integrity. Checks...
متن کاملVerifying File System Consistency at Runtime
Existing file-system reliability methods, such as checksums, redundancy, or transactional updates, provide limited defenses against file-system bugs that cause disk corruption. The existing workarounds, based on using backups or repairing the file system, are painfully slow. Worse, the recovery is performed much after the error occurred, and thus may result in further corruption and data loss. ...
متن کاملImproving Ext2 Integrity with Checksums
We have modified the ext2 file system to include checksumming on a per block basis. Our goal is to follow a realistic failure model, which accepts that disks can partially fail and do so silently. The addition of checksumming to ext2 detects silent data corruption and notifies the user if data has been changed on disk without his/her knowledge. This solution may also solve some other errors, su...
متن کاملRevisiting Fletcher and Adler Checksums
Checksums are routinely used to detect data transmission errors. However, design decisions about which checksum to use are difficult because of a lack of information about relative effectiveness of available options. We study the error detection effectiveness of the Fletcher and Adler checksums for random independent bit errors and burst errors. Our study reveals that in most cases the Fletcher...
متن کاملA model for detecting the existence of software corruption in real time
P rotection technologies in common use [8] are capable of preventing corruption by viruses (e.g. through mandatory access control), detecting known viruses (e.g. by starching for them), detecting specific types of corruption as they occur (e.g. trapping the modification of executable files in certain ways), and detecting corruption before it causes significant damage (e.g. through cryptographic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000