We have successfully developed survivable database systems in our previous research. In this project, we extend our research to survivable networked information systems.
There are two research threads:
In particular, we focus on both perfect and imperfect attack masking techniques where redundancy is smartly used to mask intrusions.
M. Yu, P. Liu, W. Zang, Self Healing Workflow Systems under Attacks, Proc. 24th IEEE International Conference on Distributed Computing Systems (ICDCS’04), Tokyo, Japan, March 2004, pages 418-425.
P. Liu, J. Jing, P. Luenam, Y. Wang, L. Li, S. Ingsriswang, The Design and Implementation of a Self-Healing Database System, Journal of Intelligent Information Systems, Accepted, in press
M. Yu, P. Liu, W. Zang, A Practical Model for Performance Evaluation of Attack Recovery Systems -- PEARS, Technical Report, 2003
M. Yu, P. Liu, W. Zang, Multi-Version Data Objects Based Attack Recovery of Workflows, Proc. 2003 Annual Computer Applications Security Conference (ACSAC'03).
M. Yu, P. Liu, W. Zang, Intrusion Masking Operations among Replica Groups, Submitted for journal publication, 2003
Acknowledgements
This research is partially supported by NSF CCR-0233324 and DARPA OASIS program