@inproceedings{scholars8995, note = {cited By 0; Conference of 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017 ; Conference Date: 5 January 2017 Through 7 January 2017; Conference Code:126221}, doi = {10.1145/3022227.3022318}, year = {2017}, title = {Mechanism to continue system availability during cyber threat scenario}, publisher = {Association for Computing Machinery, Inc}, journal = {Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017}, abstract = {It is known that cyber attacks on the application systems causes denial of services to avoid confidentiality and integrity compromise. The system remains inaccessible until it is completely recovered from that threat. This unavailability of the system is very important to handle as it results in huge monetary loss for organizations and their customers suffer with bad quality services. The main research objective is to design a framework for sustaining the system's availability at application level during the period of cyber attack. A designed framework is comprised of two compon en ts th at propose on e of the poten tial solution s for handling the system's unavailability problem while it is under attack. Ad hoc data migration is the first component that transfers the information to the alternative system's data storage when the attack is detected. Secured authentication is another very important component that compliments the alternatively available system to provide the secured information services to the end user. Secured authentication is designed differently with more strength compared to the conventional textual password authentication scheme so that the malicious users can be restricted from accessing the alternatively available system. {\^A}{\copyright} 2017 ACM.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015220910&doi=10.1145\%2f3022227.3022318&partnerID=40&md5=cb087f6b180570530db87e00bf2bb95b}, keywords = {Authentication; Computer crime; Crime; Denial-of-service attack; Digital storage; Information management; Information services; Mercury (metal); Network security, Ad hoc datum; Cyber threats; Intrusion threat; Intrusion tolerance; System availability, Availability}, isbn = {9781450348881}, author = {Safdar, S. and Akbar, R. and Hassan, M. F. and Sharef, B. T. and Hajjar, K. and Qureshi, M. A.} }