Engineering a Distributed Intrusion Tolerant Database System

Author(s):  
Peng Liu
2012 ◽  
Vol 7 (5) ◽  
pp. 224-234 ◽  
Author(s):  
Z. Falahiazar ◽  
M. Rohani ◽  
L. Falahiazar ◽  
M. Teshnelab

Author(s):  
Hai Wang

This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.


Author(s):  
Mohammed B. Yakubu ◽  
Hussaini DanAzumi ◽  
Mohammed Bulama ◽  
Abba Hassan

Privacy and security are the two major concerns of keeping and accessing data on the internet. The rate of intruding organisation’s database by unauthorised users is on the increase. Thus, the affected organisation’s data confidentiality is lost; it can be viewed, modified, deleted and/or make it inaccessible to authorised users. Intrusion detection and tolerance techniques help in recognising malicious attacks as well as supports the websites to survive the attack. A quantitative approach was used in this study even though numerous attempts of quantitative evaluation of the survivability of intrusion tolerant systems, especially in database field have been made. Study on survivability of intrusion tolerant systems has being done, taking behaviour of attack, prediction of scale, speed of database damage propagation and its degree of spreading as facilitators. This paper provides the intrusion tolerant database system as a series of state transition model (Zumkas Model) based on the hidden Markov model. Keywords: Intrusion, survivability, model, patterns


1996 ◽  
Vol 35 (03) ◽  
pp. 261-264 ◽  
Author(s):  
T. Schromm ◽  
T. Frankewitsch ◽  
M. Giehl ◽  
F. Keller ◽  
D. Zellner

Abstract:A pharmacokinetic database was constructed that is as free of errors as possible. Pharmacokinetic parameters were derived from the literature using a text-processing system and a database system. A random data sample from each system was compared with the original literature. The estimated error frequencies using statistical methods differed significantly between the two systems. The estimated error frequency in the text-processing system was 7.2%, that in the database system 2.7%. Compared with the original values in the literature, the estimated probability of error for identical pharmacokinetic parameters recorded in both systems is 2.4% and is not significantly different from the error frequency in the database. Parallel data entry with a text-processing system and a database system is, therefore, not significantly better than structured data entry for reducing the error frequency.


Sign in / Sign up

Export Citation Format

Share Document