Surviving information warfare attacks on databases
نویسندگان
چکیده
We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be violated, but data is nonetheless available to support mission objectives. We define a notion of consistency suitable for databases in which some information is known to be damaged, and other information is known to be only partially repaired. We present a protocol for normal transactions with respect to the damage markings and show that consistency preserving normal transactions maintain database consistency in the presence of damage. We present an algorithm for taking consistent snapshots of databases under attack. The snapshot algorithm has the virtue of not interfering with countermeasure transactions.
منابع مشابه
Surviving Information Warfare Attacks
T he past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial tech nologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increas ing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. Although it can range...
متن کاملReplication Does Survive Information Warfare Attacks
Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کاملThe Orientation step of the OODA loop and Information Warfare
This paper develops a theoretical model of the internal processes of the Orientation step of Boyd's OODA loop model. The Orientation step is important from an Information Warfare perspective as it is where the decision-maker combines their existing knowledge with new information. Any new information is a potential target for manipulation by Information Warfare attacks. The operation of the two ...
متن کاملCyber Warfare Simulation to Prepare to Control Cyber Space
ccurate simulation of cyber warfare can prepare decision-makers for its challenges. With cyber warfare, it is possible to control an adversaries’ information, target the portions of cyber space used for situational awareness and decision-making, lead the adversary to make desired decisions, and strike directly at the opposition’s mind. A cyber attack diminishes individual and group situational ...
متن کامل