Mechanism to continue system availability during cyber threat scenario

Sohail Safdar, Rehan Akbar, Mohd Fadzil Hassan, Baraa T. Sharef, Karim Hajjar, Muhammad Aasim Qureshi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in huge monetary loss for organizations and their customers suffer with bad quality services. The main research objective is to design a framework for sustaining the system's availability at application level during the period of cyber attack. A designed framework is comprised of two components that propose one of the potential solutions for handling the system's unavailability problem while it is under attack. Ad hoc data migration is the first component that transfers the information to the alternative system's data storage when the attack is detected. Secured authentication is another very important component that compliments the alternatively available system to provide the secured information services to the end user. Secured authentication is designed differently with more strength compared to the conventional textual password authentication scheme so that the malicious users can be restricted from accessing the alternatively available system.
Original languageEnglish
Title of host publicationProceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
PublisherAssociation for Computing Machinery, Inc
Number of pages6
ISBN (Electronic)9781450348881
DOIs
Publication statusPublished - 5 Jan 2017
Event11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 - Beppu, Japan
Duration: 5 Jan 20177 Jan 2017

Conference

Conference11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
Country/TerritoryJapan
CityBeppu
Period5/01/177/01/17

Keywords

  • Ad hoc data migration
  • Cyber threat
  • Intrusion threat
  • Intrusion tolerance
  • System availability

Cite this