A survey on database intrusion detection: approaches, challenges and application

被引:1
|
作者
Jindal, Rajni [1 ]
Singh, Indu [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
关键词
database security; database intrusion detection; insider attack; role-based access control; data dependency mining; DETECTION SYSTEM; ACCESS-CONTROL; ATTACKS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Databases store vital information of an organisation and are therefore integral for its efficient working. This necessitates the establishment of database intrusion detection systems (DIDSs) which can detect and prevent unauthorised user access to the critical information stored in database. A lot of work has been done in the field of DIDSs which has grown at a very rapid pace. A large number of publications emerging every year to further improve upon the existing state of the art solutions. This paper investigates research on major approaches proposed in the field of database intrusion detection and analyses the drawbacks of the proposed methods in order to drive future research towards more efficient and effective DIDSs. A systematic survey is conducted in order to classify various approaches for detecting intrusion in databases. The work identifies open research questions and challenges, by methodically comparing existing strategies to combat malicious transactions in a database system, and also provides an insight to the applications of DIDSs.
引用
收藏
页码:559 / 592
页数:34
相关论文
共 50 条
  • [1] Application of Deep Learning for Database Intrusion Detection
    Sahu, Rajesh Kumar
    Panigrahi, Suvasini
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 501 - 511
  • [2] A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    IEEE ACCESS, 2020, 8 : 104893 - 104917
  • [3] MANET: A SURVEY ON MACHINE LEARNING-BASED INTRUSION DETECTION APPROACHES
    Laqtib, Safaa
    El Yassini, Khalid
    Hasnaoui, Moulay Lahcen
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2019, 12 (02): : 55 - 70
  • [4] Survey of federated learning in intrusion detection
    Zhang, Hao
    Ye, Junwei
    Huang, Wei
    Liu, Ximeng
    Gu, Jason
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2025, 195
  • [5] Deep Learning Methods applied to Intrusion Detection: Survey, Taxonomy and Challenges
    Lifandali, Oumaima
    Abghour, Noreddine
    2021 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATION (DASA), 2021,
  • [6] Railway Intrusion Detection Based on Machine Vision: A Survey, Challenges, and Perspectives
    Cao, Zhiwei
    Qin, Yong
    Jia, Limin
    Xie, Zhengyu
    Gao, Yang
    Wang, Yaguan
    Li, Ping
    Yu, Zujun
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (07) : 6427 - 6448
  • [7] Database Intrusion Detection: Protecting Against the Insider Threat
    Barton, Kevin A.
    Jeffries-Horner, Carol J.
    AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges
    Pundir, Sumit
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2020, 8 (08): : 3343 - 3363
  • [9] Database Intrusion Detection by Transaction Signature
    Rathod, Yagnik A.
    Chaudhari, M. B.
    Jethava, G. B.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [10] A clustering method based on data queries and its application in database intrusion detection
    Zhong, Y
    Zhu, Z
    Qin, XL
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2096 - 2101