Loading [MathJax]/extensions/MathMenu.js
A framework for database intrusion detection system | IEEE Conference Publication | IEEE Xplore

A framework for database intrusion detection system


Abstract:

Database management system is not enough for new high-tech attack, so Database Intrusion Detection System is required as additional security layer. Over the last few year...Show More

Abstract:

Database management system is not enough for new high-tech attack, so Database Intrusion Detection System is required as additional security layer. Over the last few years, many database intrusion detection systems are developed using anomaly method like mining data dependencies among data items, access pattern etc. In this paper we have used signature based approach, which is defined on role hierarchy. Roles classify the user and makes management easy. We have worked on valid transaction sequences which are stored in profile table. This approach takes care of privilege right checking at attribute level.
Date of Conference: 22-24 December 2016
Date Added to IEEE Xplore: 26 June 2017
ISBN Information:
Conference Location: Jalgaon, India
References is not available for this document.

I. Introduction

The Information works as very serious role in any organization. Sensitive and private information is often stored within the database. Authentication, Authorization, Auditing, Encryption, Access control are traditional mechanisms which do not provide higher level of confidence. However, information era makes new responsibility for organization to manage data which increase their size with time. New Responsibility needs new technology which will work along with the existing system.

Select All
1.
"Rising risks reduced readiness Survey", US State of Cybercrime, 2014.
2.
R. Richardson, "Computer crime and security survey", Computer security Institution 2010/11.
3.
Bertino, E. Terzi, A. Kamra and A. Vakali, "Intrusion Detection in RBAC- administered Databases", Proceedings of the 21st Annual Computer Security Applications Conference, pp. 170-182, 2005.
4.
J. Fonseca, M. Vieira and H. Madeira, "Integrated Intrusion Detection in Databases", proceedings of Dependable Computing, vol. 4746, pp. 198-211, 2007.
5.
YiRu Campan, James Walden, Irina Vorobyeva and Justin Shelton, "An Effective Log Mining Approach for Database Intrusion Detection", IEEE, 2010.
6.
Yagnik Rathod, M. B. Chaudhari and G. B. Jethaya, "Database Intrusion Detection by Transaction Signature", IEEE, 2012.
7.
Li Yinzhao, Yang Dongxu, Ren Jiadong and Hu Changzhen, "An Approach for Database Intrusion Detection Based on the Event Sequence Clustering", IEEE, 2009.
8.
Rao Udai, Singh Nikhil, R. Amin Akash and Sahu Kushal, "Enhancing Detection Rate in Database Intrusion Detection System", Science and information conference, pp. 556-564, Aug 2014.
9.
Ricardo Jorge Santos, Jorge Bernardino and Marco Vieira, "Approaches and Challenges in Database Intrusion Detection", SIGMOD Record, vol. 43, September 2014.
10.
M. Kuhlmann, D. Shohat and G. Schimpf, "Role mining-revealing business roles for security administration using data mining technology", Proceedings of eighth ACM symposium on Access control models and technologies, pp. 179-186, 2003.
11.
J. Vaidya, V. Atluri and Q. Guo, "The role mining problem: finding a minimal descriptive set of roles" in SACMAT, pp. 175-184, 2007.
12.
"Detection of Privilege Abuse in RBAC Adminis tered Database" in Intelligent system in science and information, Springer, vol. 591, pp. 57-76, Feb 2015.
Contact IEEE to Subscribe

References

References is not available for this document.