In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-tolerant database prototype system. While traditional secure database systems rely on preventive controls and are very limited in surviving malicious attacks, ITDB can detect intrusions, isolate attacks, contain, assess, and repair the damage caused by intrusions in a timely manner such that sustained, self-stabilized levels of data integrity and availability can be provided to applications in the face of attacks. ITDB is implemented on top of a COTS DBMS. We have evaluated the cost-effectiveness of ITDB using several micro-benchmarks. Preliminary testing measurements suggest that when the accuracy of intrusion detection is satisfactory, ITDB can ef...
Organisations nowadays devote many resources in maintaining a robust security posture against emergi...
Intrusion detection systems play an important role in detecting online intrusions and provide necess...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Abstract: The immaturity of current intrusion detection techniques limits traditional security mecha...
While traditional secure database systems rely on prevention control and are very limited in survivi...
The explosive growth of the Internet and network connections has led to increased opportunities for ...
Abstract — our main motive research paper is towards intrusion-tolerant server’s to provide full fun...
In this paper we propose a new architecture for database intrusion detection. Recently there has bee...
Database security research aims to protect a database from unintended activities, such as authentica...
Abstract In web context, a self-healing database system which has the ability to automatically locat...
Current database survivability technologies focus on maintaining data integrity and availability in...
Abstract Despite the increased focus on security, critical information systems remain vulnerable t...
Self-securing storage turns storage devices into active parts of an intrusion survival strategy. Fro...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
∗Signatures are on file in the Graduate School. iii The immaturity of current intrusion detection te...
Organisations nowadays devote many resources in maintaining a robust security posture against emergi...
Intrusion detection systems play an important role in detecting online intrusions and provide necess...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Abstract: The immaturity of current intrusion detection techniques limits traditional security mecha...
While traditional secure database systems rely on prevention control and are very limited in survivi...
The explosive growth of the Internet and network connections has led to increased opportunities for ...
Abstract — our main motive research paper is towards intrusion-tolerant server’s to provide full fun...
In this paper we propose a new architecture for database intrusion detection. Recently there has bee...
Database security research aims to protect a database from unintended activities, such as authentica...
Abstract In web context, a self-healing database system which has the ability to automatically locat...
Current database survivability technologies focus on maintaining data integrity and availability in...
Abstract Despite the increased focus on security, critical information systems remain vulnerable t...
Self-securing storage turns storage devices into active parts of an intrusion survival strategy. Fro...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
∗Signatures are on file in the Graduate School. iii The immaturity of current intrusion detection te...
Organisations nowadays devote many resources in maintaining a robust security posture against emergi...
Intrusion detection systems play an important role in detecting online intrusions and provide necess...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...