Abstract
It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in huge monetary loss for organizations and their customers suffer with bad quality services. The main research objective is to design a framework for sustaining the system's availability at application level during the period of cyber attack. A designed framework is comprised of two components that propose one of the potential solutions for handling the system's unavailability problem while it is under attack. Ad hoc data migration is the first component that transfers the information to the alternative system's data storage when the attack is detected. Secured authentication is another very important component that compliments the alternatively available system to provide the secured information services to the end user. Secured authentication is designed differently with more strength compared to the conventional textual password authentication scheme so that the malicious users can be restricted from accessing the alternatively available system.
Original language | English |
---|---|
Title of host publication | Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 |
Publisher | Association for Computing Machinery, Inc |
Number of pages | 6 |
ISBN (Electronic) | 9781450348881 |
DOIs | |
Publication status | Published - 5 Jan 2017 |
Event | 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 - Beppu, Japan Duration: 5 Jan 2017 → 7 Jan 2017 |
Conference
Conference | 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 |
---|---|
Country/Territory | Japan |
City | Beppu |
Period | 5/01/17 → 7/01/17 |
Keywords
- Ad hoc data migration
- Cyber threat
- Intrusion threat
- Intrusion tolerance
- System availability