Optimizing an intrusion tolerant database system using neural network

N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Traditional database security mechanisms focus on either protection or prevention. However, these mechanisms have not any strategy in the presence of successful attacks. To solve this problem, the Intrusion Tolerant Database System (ITDB) was introduced. ITDB uses the new generation of database security mechanisms to guarantee specified levels of data availability, integrity and confidentiality in the presence of successful attacks. These mechanisms include attack isolation and multiphase damage confinement. In this study, researchers will present a practical model to utilize the combination of intrusion tolerance techniques for managing the ITDB architecture. Using this practical model, researchers will be able to secure the system's required integrity and availability levels considering the changes in the environment. Researchers will also introduce an intelligent method for determining the significance degrees of data objects in the optimized attack isolation technique. ©Medwell Journals, 2012.

Cite

CITATION STYLE

APA

Falahiazar, Z., Rohani, M., Falahiazar, L., & Teshnelab, M. (2012). Optimizing an intrusion tolerant database system using neural network. International Journal of Soft Computing, 7(5), 224–234. https://doi.org/10.3923/ijscomp.2012.224.234

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free