Survival of an Intrusion Tolerance Database System
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2019, Vol 3, Issue 5
Abstract
While traditional secure database systems rely on prevention control and are very limited in surviving malicious attack, an intrusion tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. The emphasis of survivability is on continuity of operations, with the understanding that the security precautions cannot guarantee that systems will not be penetrated and compromised. In this paper, we propose a framework of model based evaluation of the survivable intrusion tolerant database system. We focus on modeling the behaviors of an intrusion tolerant database system which can detect intrusions, isolate attacks, contain, assess, rejuvenate and repair limited in surviving malicious attacks. We contain the necessary quantitative metrics to measure the availability, integrity, and survivability. Quantitative measures are proposed to characterize the capability of a resilient database system surviving intrusions. Su Thawda Win "Survival of an Intrusion Tolerance Database System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26748.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26748/survival-of-an-intrusion-tolerance-database-system/su-thawda-win
Predicting the Maintenance of Aircraft Engines using LSTM
What if apart of aircraft could let you know when the aircraft component needed to be replaced or repaired It can be done with continuous data collection, monitoring, and advanced analytics. In the aviation industry, pre...
Alzheimer Patient Tracking and Alert System
Locating and securing an Alzheimers patient who is outdoors and in wandering is crucial to an Alzheimer patient safety. Although advances in geo tracking and mobile technology have made locating patients instantly possib...
Cyber-Stalking Threat to People or Bane to Technology
A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with...
Voice controlled notice board using bluetooth module
Main concept behind Voice operated Electronic notice board using display is to show messages and to control them by using our own voice. We have already seen GSM based Electronic Notice board, however speech controlled N...
Facial Emoji Recognition
Facial emoji recognition is a human computer interaction system. In recent times, automatic face recognition or facial expression recognition has attracted increasing attention from researchers in psychology, computer sc...