Reducing Damage Assessment Latency in Survivable Databases

نویسندگان

  • Indrakshi Ray
  • Ross M. McConnell
  • Monte Lunacek
  • Vijay Kumar
چکیده

Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corrupt one or more data items; benign transactions reading these data items and writing on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment are needed. In this paper we look at two existing techniques for damage assessment and analyze their complexity. We also propose a new technique that improves upon the existing techniques by reducing the time required for damage assessment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fast Strategy to Find Solution for Survivable Multicommodity ‎Network‎

This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...

متن کامل

Building Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment

Reliance on networked information systems to support critical infrastructures prompts interest in making network information systems survivable, so that they continue functioning even when under attack. To build survivable systems, attacks must be detected and reacted to before they impact performance or functionality. Previous survivable systems research focussed primarily on detecting intrusi...

متن کامل

Toward Survivable Intrusion-Tolerant Open-Source SCADA

As vital components of critical infrastructure, SCADA systems must continue to operate correctly and at their expected level of performance at all times. However, current SCADA systems are vulnerable to intrusions, and even a single compromise can cause catastrophic consequences. We present the architecture of and initial steps toward the first intrusion-tolerant open-source SCADA system that i...

متن کامل

On the Use of Heterogeneous, Wireless Sensor Networks for Damage Assessment in Bridges under Unknown Excitations

A multi-scale wireless sensor network was previously introduced by the authors and their collaborators, integrating data from a heterogeneous sensor array for a more robust and effective approach to damage detection. This multi-scale network concept was developed to improve power efficiency, minimize packet loss and latency, and eliminate synchronization issues through the use of decentralized ...

متن کامل

Autonomic Control System Utilizing Smart Valve Technology

As the level of integration across and between shipboard systems has increased in recent years, there has been greater emphasis on strategies to improve situational awareness, survivability under damage conditions, crew reduction initiatives, Damage Assessment, and Damage Action Management System (DAMS) as well as agent based automation. The above objectives necessitate consideration of an Auto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004