Persistent Link:
http://hdl.handle.net/10150/271494
Title:
Policies Based Intrusion Response System for DBMS
Author:
Nayeem, Fatima; Vijayakamal, M.
Affiliation:
Dept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, India; Dept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, India
Publisher:
IJCSN
Journal:
International Journal of Computer Science and Network (IJCSN)
Issue Date:
1-Dec-2012
Description:
Relational databases are built on Relational Model proposed by Dr. E. F. Codd. The relational model has become a consistent and widely used DBMS in the world. The databases in this model are efficient in storing and retrieval of data besides providing authentication through credentials. However, there might be many other attacks apart from stealing credentials and intruding database. Adversaries may always try to intrude into the relational database for monetary or other gains [1]. The relational databases are subjected to malicious attacks as they hold the valuable business data which is sensitive in nature. Monitoring such database continuously is a task which is inevitable keeping the importance of database in mind. This is a strategy that is in top five database strategies as identified by Gartner research which are meant for getting rid of data leaks in organizations [2]. There are regulations from governments like US with respect to managing data securely. The data management like HIAPP, GLBA, and PCI etc. is mentioned in the regulations as examples.
URI:
http://hdl.handle.net/10150/271494
Additional Links:
http://ijcsn.org/IJCSN-2012/1-6/IJCSN-2012-1-6-46.pdf
Abstract:
Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.
Type:
Technical Report
Language:
en
Keywords:
Intrusion detection; intrusion response system; policies; relational database
Series/Report no.:
IJCSN-2012-1-6-46; 110
ISSN:
2277-5420

Full metadata record

DC FieldValue Language
dc.contributor.authorNayeem, Fatimaen_US
dc.contributor.authorVijayakamal, M.en_US
dc.date.accessioned2013-03-07T23:35:15Z-
dc.date.available2013-03-07T23:35:15Z-
dc.date.issued2012-12-01-
dc.identifier.issn2277-5420-
dc.identifier.urihttp://hdl.handle.net/10150/271494-
dc.descriptionRelational databases are built on Relational Model proposed by Dr. E. F. Codd. The relational model has become a consistent and widely used DBMS in the world. The databases in this model are efficient in storing and retrieval of data besides providing authentication through credentials. However, there might be many other attacks apart from stealing credentials and intruding database. Adversaries may always try to intrude into the relational database for monetary or other gains [1]. The relational databases are subjected to malicious attacks as they hold the valuable business data which is sensitive in nature. Monitoring such database continuously is a task which is inevitable keeping the importance of database in mind. This is a strategy that is in top five database strategies as identified by Gartner research which are meant for getting rid of data leaks in organizations [2]. There are regulations from governments like US with respect to managing data securely. The data management like HIAPP, GLBA, and PCI etc. is mentioned in the regulations as examples.en_US
dc.description.abstractIntrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.en_US
dc.language.isoenen_US
dc.publisherIJCSNen_US
dc.relation.ispartofseriesIJCSN-2012-1-6-46en_US
dc.relation.ispartofseries110en_US
dc.relation.urlhttp://ijcsn.org/IJCSN-2012/1-6/IJCSN-2012-1-6-46.pdfen_US
dc.subjectIntrusion detectionen_US
dc.subjectintrusion response systemen_US
dc.subjectpoliciesen_US
dc.subjectrelational databaseen_US
dc.titlePolicies Based Intrusion Response System for DBMSen_US
dc.typeTechnical Reporten_US
dc.contributor.departmentDept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, Indiaen_US
dc.contributor.departmentDept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, Indiaen_US
dc.identifier.journalInternational Journal of Computer Science and Network (IJCSN)en_US
All Items in UA Campus Repository are protected by copyright, with all rights reserved, unless otherwise indicated.