Architectures for intrusion tolerant database systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations

Abstract

In this paper we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. With a focus on attacks by malicious transactions, Architecture I can detect intrusions, and locate and repair the damage caused by the intrusions. Architecture II enhances Architecture I with the ability to isolate attacks so that the database can be immunized from the damage caused by a lot of attacks. Architecture III enhances Architecture I with the ability to dynamically contain the damage in such a way that no damage will leak out during the attack recovery process. Architecture IV enhances Architectures II and III with the ability to adapt the intrusion-tolerance controls to the changing environment so that a stabilized level of trustworthiness can be maintained. Architecture IV enhances Architecture IV with the ability to deliver differential, quantitative QoIA services to customers who have subscribed for these services even in the face of attacks.

Original languageEnglish (US)
Title of host publicationProceedings - 18th Annual Computer Security Applications Conference, ACSAC 2002
PublisherIEEE Computer Society
Pages311-320
Number of pages10
ISBN (Electronic)0769518281
DOIs
StatePublished - 2002
Event18th Annual Computer Security Applications Conference, ACSAC 2002 - Las Vegas, United States
Duration: Dec 9 2002Dec 13 2002

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
Volume2002-January
ISSN (Print)1063-9527

Other

Other18th Annual Computer Security Applications Conference, ACSAC 2002
Country/TerritoryUnited States
CityLas Vegas
Period12/9/0212/13/02

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Architectures for intrusion tolerant database systems'. Together they form a unique fingerprint.

Cite this