Reducing Damage Assessment Latency in Survivable Databases
نویسندگان
چکیده
Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corrupt one or more data items; benign transactions reading these data items and writing on other data items can help spread the damage. To prevent the damage from spreading, it is important to assess the damage and confine it as quickly as possible. Algorithms providing fast damage assessment are needed. In this paper we look at two existing techniques for damage assessment and analyze their complexity. We also propose a new technique that improves upon the existing techniques by reducing the time required for damage assessment.
منابع مشابه
A Fast Strategy to Find Solution for Survivable Multicommodity Network
This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...
متن کاملBuilding Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment
Reliance on networked information systems to support critical infrastructures prompts interest in making network information systems survivable, so that they continue functioning even when under attack. To build survivable systems, attacks must be detected and reacted to before they impact performance or functionality. Previous survivable systems research focussed primarily on detecting intrusi...
متن کاملToward Survivable Intrusion-Tolerant Open-Source SCADA
As vital components of critical infrastructure, SCADA systems must continue to operate correctly and at their expected level of performance at all times. However, current SCADA systems are vulnerable to intrusions, and even a single compromise can cause catastrophic consequences. We present the architecture of and initial steps toward the first intrusion-tolerant open-source SCADA system that i...
متن کاملOn the Use of Heterogeneous, Wireless Sensor Networks for Damage Assessment in Bridges under Unknown Excitations
A multi-scale wireless sensor network was previously introduced by the authors and their collaborators, integrating data from a heterogeneous sensor array for a more robust and effective approach to damage detection. This multi-scale network concept was developed to improve power efficiency, minimize packet loss and latency, and eliminate synchronization issues through the use of decentralized ...
متن کاملAutonomic Control System Utilizing Smart Valve Technology
As the level of integration across and between shipboard systems has increased in recent years, there has been greater emphasis on strategies to improve situational awareness, survivability under damage conditions, crew reduction initiatives, Damage Assessment, and Damage Action Management System (DAMS) as well as agent based automation. The above objectives necessitate consideration of an Auto...
متن کامل