Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems

10/04/2018
by   Muhamad Felemban, et al.
0

Data-intensive applications exhibit increasing reliance on Database Management Systems (DBMSs, for short). With the growing cyber-security threats to government and commercial infrastructures, the need to develop high resilient cyber systems is becoming increasingly important. Cyber-attacks on DBMSs include intrusion attacks that may result in severe degradation in performance. Several efforts have been directed towards designing an integrated management system to detect, respond, and recover from malicious attacks. In this paper, we propose a data Partitioning-based Intrusion Management System (PIMS, for short) that can endure intense malicious intrusion attacks on DBMS. The novelty in PIMS is the ability to contain the damage into data partitions, termed Intrusion Boundaries (IBs, for short). The IB Demarcation Problem (IBDP, for short) is formulated as a mixed integer nonlinear programming. We prove that IBDP is NP-hard. Accordingly, two heuristic solutions for IBDP are introduced. The proposed architecture for PIMS includes novel IB-centric response and recovery mechanisms, which executes compensating transactions. PIMS is prototyped within PostgreSQL, an open-source DBMS. Finally, empirical and experimental performance evaluation of PIMS are conducted to demonstrate that intelligent partitioning of data tuples improves the overall availability of the DBMS under intrusion attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2018

PIMS: A Partitioning-Based Intrusion Management System for Relational Databases

Data-intensive applications exhibit increasing reliance on Database Mana...
research
03/27/2020

A Security and Performance Driven Architecture for Cloud Data Centers

With the growing cyber-security threats, ensuring the security of data i...
research
11/22/2021

PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks

The increase in scale of cyber networks and the rise in sophistication o...
research
04/19/2020

An overview of Intrusion Detection and Prevention Systems

Cyber threats are increasing not only in their volume but also in their ...
research
04/01/2021

Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A Systematic Review

With the purpose of defending against lateral movement in todays borderl...
research
07/24/2022

CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture

Microservices Architecture (MSA) has become a de-facto standard for desi...

Please sign up or login with your details

Forgot password? Click here to reset