Engineering a distributed intrusion tolerant database system using COTS components

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-tolerant database prototype system. While traditional secure database systems rely on preventive controls and are very limited in surviving malicious attacks, ITDB can detect intrusions, isolate attacks, contain, assess, and repair the damage caused by intrusions in a timely manner such that sustained, self-stabilized levels of data integrity and availability can be provided to applications in face of attacks. ITDB is implemented on top of a COTS DBMS. Preliminary testing measurements of ITDB suggest that when the accuracy of intrusion detection is satisfactory, ITDB can effectively locate and repair the damage on-the-fly with reasonable (database) performance penalty.

Original languageEnglish (US)
Title of host publicationProceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages284-289
Number of pages6
ISBN (Electronic)0769518974, 9780769518978
DOIs
StatePublished - 2003
EventDARPA Information Survivability Conference and Exposition, DISCEX 2003 - Washington, United States
Duration: Apr 22 2003Apr 24 2003

Publication series

NameProceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003
Volume2

Other

OtherDARPA Information Survivability Conference and Exposition, DISCEX 2003
Country/TerritoryUnited States
CityWashington
Period4/22/034/24/03

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Control and Systems Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Engineering a distributed intrusion tolerant database system using COTS components'. Together they form a unique fingerprint.

Cite this