The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to prevent multiple attacks of the same type, and damage containment during the repair process. One of the most active faculty members of the research group, Assistant Professor Peng Liu, is the author of this paper, which was presented at a conference in December 2002.
(no comments available yet for this resource)