The immaturity of current intrusion detection techniques limits traditional security mechanisms in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these limitations. However, to what extent an intrusion tolerant system can mitigate detection deficiencies is still unknown. In this paper, first, the authors focus on quantifying suitable measures to characterize the survivability of an intrusion tolerant database system. This facilitates a systematic evaluation of the impact of intrusion detection deficiencies on the capability of an intrusion tolerant database system surviving attacks.