Architectures for Intrusion Tolerant Database Systems

  • Authors:
  • Peng Liu

  • Affiliations:
  • -

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose four architectures forintrusion-tolerant database systems. While traditional securedatabase systems rely on prevention controls, anintrusion-tolerant database system can operate through attacksin such a way that the system can continue deliveringessential services in the face of attacks. With a focus onattacks by malicious transactions, Architecture I can detectintrusions, and locate and repair the damage caused by theintrusions. Architecture II enhances Architecture I with theability to isolate attacks so that the database can be immunizedfrom the damage caused by a lot of attacks. ArchitectureIII enhances Architecture I with the ability to dynamicallycontain the damage in such a way that no damagewill leak out during the attack recovery process. ArchitectureIV enhances Architectures II and III with the ability toadapt the intrusion-tolerance controls to the changing environmentso that a stabilized level of trustworthiness can bemaintained. Architecture V enhances Architecture IV withthe ability to deliver differential, quantitative QoIA servicesto customers who have subscribed for these services even inthe face of attacks.