A survey on database intrusion detection: approaches, challenges and application

被引:1
|
作者
Jindal, Rajni [1 ]
Singh, Indu [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
关键词
database security; database intrusion detection; insider attack; role-based access control; data dependency mining; DETECTION SYSTEM; ACCESS-CONTROL; ATTACKS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Databases store vital information of an organisation and are therefore integral for its efficient working. This necessitates the establishment of database intrusion detection systems (DIDSs) which can detect and prevent unauthorised user access to the critical information stored in database. A lot of work has been done in the field of DIDSs which has grown at a very rapid pace. A large number of publications emerging every year to further improve upon the existing state of the art solutions. This paper investigates research on major approaches proposed in the field of database intrusion detection and analyses the drawbacks of the proposed methods in order to drive future research towards more efficient and effective DIDSs. A systematic survey is conducted in order to classify various approaches for detecting intrusion in databases. The work identifies open research questions and challenges, by methodically comparing existing strategies to combat malicious transactions in a database system, and also provides an insight to the applications of DIDSs.
引用
收藏
页码:559 / 592
页数:34
相关论文
共 50 条
  • [31] Two-stage database intrusion detection by combining multiple evidence and belief update
    Suvasini Panigrahi
    Shamik Sural
    Arun K. Majumdar
    Information Systems Frontiers, 2013, 15 : 35 - 53
  • [32] A review on intrusion detection approaches in cloud security systems
    Singh, Satyapal
    Kubendiran, Mohan
    Sangaiah, Arun Kumar
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (04) : 361 - 374
  • [33] Database Intrusion Detection Using Role Profiling with Role Hierarchy
    Wu, Garfield Zhiping
    Osborn, Sylvia L.
    Jin, Xin
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 33 - +
  • [34] Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection
    Subudhi, Sharmila
    Behera, Tanmay Kumar
    Panigrahi, Suvasini
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 78 - 82
  • [35] Classifying Database Users for Intrusion Prediction and Detection in Data Security
    Bakir, Cigdem
    Hakkoymaz, Veli
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2020, 27 (06): : 1857 - 1862
  • [36] Intrusion Detection in 5G and Wi-Fi Networks: A Survey of Current Methods, Challenges, and Perspectives
    Hamroun, Cherifa
    Fladenmuller, Anne
    Pariente, Michel
    Pujolle, Guy
    IEEE ACCESS, 2025, 13 : 40950 - 40976
  • [37] A Survey on Data-driven Network Intrusion Detection
    Chou, Dylan
    Jiang, Meng
    ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [38] A Survey of CNN-Based Network Intrusion Detection
    Mohammadpour, Leila
    Ling, Teck Chaw
    Liew, Chee Sun
    Aryanfar, Alihossein
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [39] Machine Learning Combining with Visualization for Intrusion Detection: A Survey
    Yu, Yang
    Long, Jun
    Liu, Fang
    Cai, Zhiping
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, (MDAI 2016), 2016, 9880 : 239 - 249
  • [40] Network Intrusion Detection, Prevention and Sustainable Mechanisms: A Survey
    Kannari, Phanindra Reddy
    Shariff, Noorullah C.
    Biradar, Raj Kumar L.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 4712 - 4724