A survey on database intrusion detection: approaches, challenges and application

被引:1
|
作者
Jindal, Rajni [1 ]
Singh, Indu [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
关键词
database security; database intrusion detection; insider attack; role-based access control; data dependency mining; DETECTION SYSTEM; ACCESS-CONTROL; ATTACKS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Databases store vital information of an organisation and are therefore integral for its efficient working. This necessitates the establishment of database intrusion detection systems (DIDSs) which can detect and prevent unauthorised user access to the critical information stored in database. A lot of work has been done in the field of DIDSs which has grown at a very rapid pace. A large number of publications emerging every year to further improve upon the existing state of the art solutions. This paper investigates research on major approaches proposed in the field of database intrusion detection and analyses the drawbacks of the proposed methods in order to drive future research towards more efficient and effective DIDSs. A systematic survey is conducted in order to classify various approaches for detecting intrusion in databases. The work identifies open research questions and challenges, by methodically comparing existing strategies to combat malicious transactions in a database system, and also provides an insight to the applications of DIDSs.
引用
收藏
页码:559 / 592
页数:34
相关论文
共 50 条
  • [21] A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment
    Bhavani, A. Durga
    Mangla, Neha
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 171 - 183
  • [22] An Effective Log Mining Approach for Database Intrusion Detection
    Hu, Yi
    Campan, Alina
    Walden, James
    Vorobyeva, Irina
    Shelton, Justin
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [23] Analysis of database abnormity intrusion based outliers detection
    Yuan Zhong-yi
    Tang Wen-zhong
    Xu Xiao-lin
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1144 - 1147
  • [24] Architecture for data collection in database intrusion detection systems
    Jin, Xin
    Osborn, Sylvia L.
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 96 - +
  • [25] Perimeter Intrusion Detection by Video Surveillance: A Survey
    Lohani, Devashish
    Crispim-Junior, Carlos
    Barthelemy, Quentin
    Bertrand, Sarah
    Robinault, Lionel
    Tougne Rodet, Laure
    SENSORS, 2022, 22 (09)
  • [26] A Survey of Methods for the Construction of an Intrusion Detection System
    Kassem, Abdel Karim
    Arkoub, Shymaa Abo
    Daya, Bassam
    Chauvet, Pierre
    ARTIFICIAL INTELLIGENCE AND APPLIED MATHEMATICS IN ENGINEERING PROBLEMS, 2020, 43 : 211 - 225
  • [27] A Survey: Intrusion Detection Techniques for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 86 - 105
  • [28] A survey of intrusion detection systems in smart grid
    Jow, Julius
    Xiao, Yang
    Han, Wenlin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (03) : 170 - 186
  • [29] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [30] Two-stage database intrusion detection by combining multiple evidence and belief update
    Panigrahi, Suvasini
    Sural, Shamik
    Majumdar, Arun K.
    INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 35 - 53