Abstract
Preventive measures sometimes fail to defect malicious attacks. With cyber attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. Intrusion detectors are a key component of an intrusion tolerant database system. However, a relatively long detection latency is usually unavoidable for detection accuracy, especially in anomaly detection, and it can cause ineffective - to some degree at least - damage confinement, In a busy database ineffective confinement can make the database too damaged to be useful, In this paper, we present an innovative multi-phase damage confinement approach to solve this problem, In contract to a traditional one-phase confinement approach our approach has one confining phase to quickly confine the damage, and one or more later on unconfining phases to unconfine the objects that are mistakenly confined during the first phase. Our approach can ensure no damage spreading after the detection time, although some availability can be temporarily lost. Our approach can be easily extended to support flexible control of damage spreading and multiple confinement policies. Our approach is practical, effective, efficient, and to a large extent assessment independent.
Original language | English (US) |
---|---|
Title of host publication | Proceedings of the Computer Security Foundations Workshop |
Pages | 191-205 |
Number of pages | 15 |
DOIs | |
State | Published - 2001 |
Event | 14th IEEE Computer Security Foundations Workshop (CSFW-14) - Cape Brenton, NS, United States Duration: Jun 11 2001 → Jun 13 2001 |
Other
Other | 14th IEEE Computer Security Foundations Workshop (CSFW-14) |
---|---|
Country/Territory | United States |
City | Cape Brenton, NS |
Period | 6/11/01 → 6/13/01 |
All Science Journal Classification (ASJC) codes
- Software