A survey on database intrusion detection: approaches, challenges and application

被引:1
|
作者
Jindal, Rajni [1 ]
Singh, Indu [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, Delhi, India
关键词
database security; database intrusion detection; insider attack; role-based access control; data dependency mining; DETECTION SYSTEM; ACCESS-CONTROL; ATTACKS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Databases store vital information of an organisation and are therefore integral for its efficient working. This necessitates the establishment of database intrusion detection systems (DIDSs) which can detect and prevent unauthorised user access to the critical information stored in database. A lot of work has been done in the field of DIDSs which has grown at a very rapid pace. A large number of publications emerging every year to further improve upon the existing state of the art solutions. This paper investigates research on major approaches proposed in the field of database intrusion detection and analyses the drawbacks of the proposed methods in order to drive future research towards more efficient and effective DIDSs. A systematic survey is conducted in order to classify various approaches for detecting intrusion in databases. The work identifies open research questions and challenges, by methodically comparing existing strategies to combat malicious transactions in a database system, and also provides an insight to the applications of DIDSs.
引用
收藏
页码:559 / 592
页数:34
相关论文
共 50 条
  • [41] Ensemble of Deep Convolutional Learning Classifier System Based on Genetic Algorithm for Database Intrusion Detection
    Bu, Seok-Jun
    Kang, Han-Bit
    Cho, Sung-Bae
    ELECTRONICS, 2022, 11 (05)
  • [42] A survey of neural networks usage for intrusion detection systems
    Drewek-Ossowicka, Anna
    Pietrolaj, Mariusz
    Ruminski, Jacek
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 497 - 514
  • [43] A review of recent approaches on wrapper feature selection for intrusion detection
    Maldonado, Javier
    Cristina Riff, Maria
    Neveu, Bertrand
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198
  • [44] Study of Database Intrusion Detection Based on Improved Association Rule Algorithm
    Zhang Yanyan
    Yao Yuan
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 673 - 676
  • [45] Detection of Database Intrusion Using a Two-Stage Fuzzy System
    Panigrahi, Suvasini
    Sural, Shamik
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 107 - 120
  • [46] Conditional Adherence based Classification of Transactions for Database Intrusion Detection and Prevention
    Singh, Indu
    Darbari, Vaibhav
    Kejriwal, Lakshya
    Agarwal, Aditya
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 42 - 49
  • [47] CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model
    Kim, Tae-Young
    Cho, Sung-Bae
    NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IV, 2019, 1142 : 131 - 139
  • [48] An Extensive Survey on Intrusion Detection- Past, Present, Future
    Nagaraja, Arun
    Kumar, T. Satish
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [49] A survey of cloud-based network intrusion detection analysis
    Keegan, Nathan
    Ji, Soo-Yeon
    Chaudhary, Aastha
    Concolato, Claude
    Yu, Byunggu
    Jeong, Dong Hyun
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2016, 6
  • [50] A Survey of Random Forest Based Methods for Intrusion Detection Systems
    Alves Resende, Paulo Angelo
    Drummond, Andre Costa
    ACM COMPUTING SURVEYS, 2018, 51 (03)