Database Intrusion Detection by Transaction Signature

被引:0
作者
Rathod, Yagnik A. [1 ]
Chaudhari, M. B. [1 ]
Jethava, G. B.
机构
[1] GEC, CE Dept, Gandhinagar, Gujarat, India
来源
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT) | 2012年
关键词
Database Security; Log mining; Intrusion detection;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose an approach for intrusion detection system for database management system. Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.
引用
收藏
页数:5
相关论文
共 11 条
  • [1] [Anonymous], 1990, TECHNICAL REPORT
  • [2] Barbara D., 2002, P 16 ANN IFIP WG 11
  • [3] Chung ChristinaYip., 1999, Proceedings of the Integrity and Internal Control in Information System, P159
  • [4] The KDD process for extracting useful knowledge from volumes of data
    Fayyad, U
    PiatetskyShapiro, G
    Smyth, P
    [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (11) : 27 - 34
  • [5] Han J, 2000, Data mining: Concepts and Techniques
  • [6] Hu Y., 2004, SAC 04, P711, DOI DOI 10.1145/967900.968048
  • [7] Lee S., 7 EUR S RES COMP SEC
  • [8] Lee S. Y., 2002, P 7 EUR S RES COMP S
  • [9] LEE V, 2000, P 6 IEEE REAL TIM TE
  • [10] Madeira Marco Vieira Henrique, 2005, DEP COMP 2005 P 11 P