Modeling and evaluating the survivability of an intrusion tolerant database system

Hai Wang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. Before intrusion tolerance is accepted as an approach to security, there must be quantitative methods to measure its survivability. However, there are very few attempts to do quantitative, model-based evaluation of the survivability of intrusion tolerant systems, especially in database field. In this paper, we focus on modeling the behaviors of an intrusion tolerant database system in the presence of attacks. Quantitative measures are proposed to characterize the capability of a resilient database system surviving intrusions. An Intrusion Tolerant DataBase system (ITDB) is studied as an example. Our experimental results validate the models we proposed. Survivability evaluation is also conducted to study the impact of attack intensity and various system deficiencies on the survivability.

Original languageEnglish (US)
Title of host publicationComputer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages207-224
Number of pages18
ISBN (Print)354044601X, 9783540446019
StatePublished - Jan 1 2006
Event11th European Symposium on Research in Computer Security, ESORICS 2006 - Hamburg, Germany
Duration: Sep 18 2006Sep 20 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4189 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th European Symposium on Research in Computer Security, ESORICS 2006
CountryGermany
CityHamburg
Period9/18/069/20/06

Fingerprint

Survivability
Database Systems
Intrusion Tolerance
Attack
Modeling
Evaluation
Intrusion detection
Intrusion Detection
Security systems
Model-based
Experimental Results

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Wang, H., & Liu, P. (2006). Modeling and evaluating the survivability of an intrusion tolerant database system. In Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings (pp. 207-224). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4189 LNCS). Springer Verlag.
Wang, Hai ; Liu, Peng. / Modeling and evaluating the survivability of an intrusion tolerant database system. Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, 2006. pp. 207-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{73699a40f39f4e94932fed7681508aab,
title = "Modeling and evaluating the survivability of an intrusion tolerant database system",
abstract = "The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. Before intrusion tolerance is accepted as an approach to security, there must be quantitative methods to measure its survivability. However, there are very few attempts to do quantitative, model-based evaluation of the survivability of intrusion tolerant systems, especially in database field. In this paper, we focus on modeling the behaviors of an intrusion tolerant database system in the presence of attacks. Quantitative measures are proposed to characterize the capability of a resilient database system surviving intrusions. An Intrusion Tolerant DataBase system (ITDB) is studied as an example. Our experimental results validate the models we proposed. Survivability evaluation is also conducted to study the impact of attack intensity and various system deficiencies on the survivability.",
author = "Hai Wang and Peng Liu",
year = "2006",
month = "1",
day = "1",
language = "English (US)",
isbn = "354044601X",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "207--224",
booktitle = "Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings",
address = "Germany",

}

Wang, H & Liu, P 2006, Modeling and evaluating the survivability of an intrusion tolerant database system. in Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4189 LNCS, Springer Verlag, pp. 207-224, 11th European Symposium on Research in Computer Security, ESORICS 2006, Hamburg, Germany, 9/18/06.

Modeling and evaluating the survivability of an intrusion tolerant database system. / Wang, Hai; Liu, Peng.

Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, 2006. p. 207-224 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4189 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Modeling and evaluating the survivability of an intrusion tolerant database system

AU - Wang, Hai

AU - Liu, Peng

PY - 2006/1/1

Y1 - 2006/1/1

N2 - The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. Before intrusion tolerance is accepted as an approach to security, there must be quantitative methods to measure its survivability. However, there are very few attempts to do quantitative, model-based evaluation of the survivability of intrusion tolerant systems, especially in database field. In this paper, we focus on modeling the behaviors of an intrusion tolerant database system in the presence of attacks. Quantitative measures are proposed to characterize the capability of a resilient database system surviving intrusions. An Intrusion Tolerant DataBase system (ITDB) is studied as an example. Our experimental results validate the models we proposed. Survivability evaluation is also conducted to study the impact of attack intensity and various system deficiencies on the survivability.

AB - The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. Before intrusion tolerance is accepted as an approach to security, there must be quantitative methods to measure its survivability. However, there are very few attempts to do quantitative, model-based evaluation of the survivability of intrusion tolerant systems, especially in database field. In this paper, we focus on modeling the behaviors of an intrusion tolerant database system in the presence of attacks. Quantitative measures are proposed to characterize the capability of a resilient database system surviving intrusions. An Intrusion Tolerant DataBase system (ITDB) is studied as an example. Our experimental results validate the models we proposed. Survivability evaluation is also conducted to study the impact of attack intensity and various system deficiencies on the survivability.

UR - http://www.scopus.com/inward/record.url?scp=33750260971&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750260971&partnerID=8YFLogxK

M3 - Conference contribution

SN - 354044601X

SN - 9783540446019

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 207

EP - 224

BT - Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings

PB - Springer Verlag

ER -

Wang H, Liu P. Modeling and evaluating the survivability of an intrusion tolerant database system. In Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings. Springer Verlag. 2006. p. 207-224. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).