Optimizing Security Measures in an Intrusion Tolerant Database System

Author(s):  
Toshikazu Uemura ◽  
Tadashi Dohi
2012 ◽  
Vol 7 (5) ◽  
pp. 224-234 ◽  
Author(s):  
Z. Falahiazar ◽  
M. Rohani ◽  
L. Falahiazar ◽  
M. Teshnelab

Author(s):  
Hai Wang

This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.


Author(s):  
Mohammed B. Yakubu ◽  
Hussaini DanAzumi ◽  
Mohammed Bulama ◽  
Abba Hassan

Privacy and security are the two major concerns of keeping and accessing data on the internet. The rate of intruding organisation’s database by unauthorised users is on the increase. Thus, the affected organisation’s data confidentiality is lost; it can be viewed, modified, deleted and/or make it inaccessible to authorised users. Intrusion detection and tolerance techniques help in recognising malicious attacks as well as supports the websites to survive the attack. A quantitative approach was used in this study even though numerous attempts of quantitative evaluation of the survivability of intrusion tolerant systems, especially in database field have been made. Study on survivability of intrusion tolerant systems has being done, taking behaviour of attack, prediction of scale, speed of database damage propagation and its degree of spreading as facilitators. This paper provides the intrusion tolerant database system as a series of state transition model (Zumkas Model) based on the hidden Markov model. Keywords: Intrusion, survivability, model, patterns


2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document