PIMS: A Partitioning-Based Intrusion Management System for Relational Databases

10/04/2018
by   Muhamad Felemban, et al.
0

Data-intensive applications exhibit increasing reliance on Database Management Systems (DBMSs, for short). With the growing cyber-security threats to government and commercial infrastructures, the need to develop high resilient cyber systems is becoming increasingly important. Cyber-attacks on DBMSs include intrusion attacks that may result in severe degradation in performance. Several efforts have been directed towards designing an integrated management system to detect, respond, and recover from malicious attacks. In this paper, we propose a data Partitioning-based Intrusion Management System (PIMS, for short) that can endure intense malicious intrusion attacks on DBMS. The novelty in PIMS is the ability to contain the damage into data partitions, termed Intrusion Boundaries (IBs, for short). The IB Demarcation Problem (IBDP, for short) is formulated as a mixed integer nonlinear programming. We prove that IBDP is NP-hard. Accordingly, two heuristic solutions for IBDP are introduced. The proposed architecture for PIMS includes novel IB-centric response and recovery mechanisms, which executes compensating transactions. PIMS is prototyped within PostgreSQL, an open-source DBMS. Finally, empirical and experimental performance evaluation of PIMS are conducted to demonstrate that intelligent partitioning of data tuples improves the overall availability of the DBMS under intrusion attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2018

Design and Evaluation of A Data Partitioning-Based Intrusion Management Architecture for Database Systems

Data-intensive applications exhibit increasing reliance on Database Mana...
research
03/27/2020

A Security and Performance Driven Architecture for Cloud Data Centers

With the growing cyber-security threats, ensuring the security of data i...
research
11/22/2021

PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks

The increase in scale of cyber networks and the rise in sophistication o...
research
01/14/2022

Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots

Cyber Security is a critical topic for organizations with IT/OT networks...
research
07/08/2020

Agile Approach for IT Forensics Management

The forensic investigation of cyber attacks and IT incidents is becoming...
research
06/05/2019

Updating the Wassenaar Debate Once Again: Surveillance, Intrusion Software, and Ambiguity

This paper analyzes a recent debate on regulating cyber weapons through ...

Please sign up or login with your details

Forgot password? Click here to reset