Detecting Integrity Attacks to a Data Stream Management System

Author

Abstract

In recent years, Cyber Warfare has been one of the most essential war scenes for intelligence and military organiza-tions. As the volume of data is increased, data stream processing and data security would be the basic requirements of military enterprises. Although, by data encryption no one can have access to data contents, but adversaries can delete some records from data stream or add some counterfeit records in it without any knowledge about records contents. Such attacks are called integrity attacks. Because integrity control in DSMS is a continuous process, it may be catego-rized in passive defense activities.In this paper, we present a probabilistic auditing model for integrity control of re-ceived stream results via an unsecured environment. In our architecture, users and data stream owners are trusted and channels are unsecured. The server is considered a black box and auditing process is fulfilled by contribution between data stream owner and users. We exploit existing Data Stream Management Systems (DSMS) without any modification. Our method has no significant cost on usersside and detects integrity attacks accurately and rapidly. Correctness and convergence of our probabilistic algorithm is proved andour evaluation shows very good results.

Keywords


Volume 2, Issue 2 - Serial Number 4
October 2011
Pages 57-70
  • Receive Date: 30 January 2019
  • Revise Date: 22 November 2024
  • Accept Date: 30 January 2019
  • Publish Date: 22 June 2011