{"title":"The architecture of an intrusion tolerant database system","authors":"Z. Falahiazar, M. Rohani","doi":"10.1109/ICEIT.2010.5607768","DOIUrl":null,"url":null,"abstract":"With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.","PeriodicalId":346498,"journal":{"name":"2010 International Conference on Educational and Information Technology","volume":"256 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Educational and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEIT.2010.5607768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
With the ever increasing development and expansion of database use, protection of database against hazards, which threaten the integrity, availability and confidentiality of database, is inevitable. However, traditional mechanisms of database security is concentrated on protection or prevention. The main objective of an intrusion tolerant database system is such that even if a number of attacks penetrated inside information system, specified levels of availability, integrity and confidentiality are yet guaranteed. A key part of intrusion tolerant database system is intrusion detection which informs system about attacks. However, detection latency will result in damage spreading. Two novel techniques are used for containment of damage in intrusion tolerant database system: Attack isolation and multiphase damage Confinement. These techniques have been posed as general solutions and in real applications, they may cause outbreak of problems in integrity and availability. In this paper, we present a practical architecture for an intrusion tolerant database system with the aim of safeguarding integrity and availability in the presence of successful attacks through taking advantages of these two techniques.