Research Article | Open Access | Download PDF
Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P107 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P107
Data-Base Security Using Different Techniques: A Survey
Abhijeet Sartape, Prof. Vasgi B. P
Citation :
Abhijeet Sartape, Prof. Vasgi B. P, "Data-Base Security Using Different Techniques: A Survey," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 483-485, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P107
Abstract
In many organizations, Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depend on Database Security, i.e. Insider attack detection. In this paper, mainly three insider attack detection techniques introduced are as follows Log examining, Query clustering & Policy-based mechanism. In Log examining approach given transaction of each user should be examined or tested for insider attack. In Query clustering approach external query (outlier) i.e. other than a cluster of query, should be detected. In policy-based mechanism, each user having its own policy data & if any policy violated, then it should be detected as an insider attack. These three approaches should perform database correlations for identifying malicious database transactions.
Keywords
Database Security, Log Examining, Query Clustering, policy Based Mechanism.
References
[1] A.Conry-Murray,” The Threat from within. Network Computing (AUG. 2005),” , July 2009.
[2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” 2010.
[3] M. Nicolett and J. Wheatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead. Gartner Research (Nov. 2007),” http://www.gartner.com, 2010.
[4] Yi Ru, Alina Campan, James Walden, Irina Vorobyeva, Justin Shelton, “An Effective Log Mining Approach For Database intrusion Detection *”, 978-1-4244-6588-0/10 IEEE, 2010.
[5] Srivastava, A, Sural S., and Majumdar, AK.: Database Intrusion Detection Using Weighted Sequence Mining, Journal of Computers, vol. 1, no. 4 (2006)
[6] Agrawal, R., Imieliilski, T., Swami, A: Mining association rules between sets of items in large databases, In Proceedings of the 1993 ACM SIGMOD international conference on Management of data (1993)
[7] Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, and Shambhu Upadhyaya, “A Data- Centric Approach to Insider Attack Detection in Database Systems”, S. Jha, R. Sommer, and C. Kreibich (Eds.): RAID 2010, LNCS 6307, pp. 382–401, 2010. Springer-Verlag Berlin Heidelberg 2010.
[8] Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. In: SIGMOD Conference, pp. 539–550 (2003).
[9] Chung, C.Y., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems. In: Integrity and Internal Control Information Systems: Strategic Views on the Need for Control, pp. 159–178. Kluwer Academic Publishers, Norwell (2000).
[10] Fonseca, J., Vieira, M., Madeira, H.: Online detection of malicious data access using dbms auditing. In: Proc. of the 2008 ACM Symposium on Applied Computing (SAC 2008), pp. 1013–1020 (2008).
[11] Ashish Kamra and Elisa Bertino,” Design and Implementation of an Intrusion Response System for Relational Databases”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol. 23, no. 6, June 2011.
[12] A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous Access Patterns in Relational Databases,” J. Very Large DataBases (VLDB),vol. 17, no. 5, pp. 1063-1077, 2008.
[13] A. Kamra, E. Bertino, and R.V. Nehme, “Responding to Anomalous Database Requests,” Secure Data Management, pp. 50-66, Springer, 2008.
[14] “Oracle Database Concepts 11g 1 (11.1)”,download.oracle.com/docs/cd/B28359_01/server.111/b28318/d atadict.htm, July 2009.
[15] R. Gennaro, T. Rabin, S. Jarecki, and H. Krawczyk, “Robust and Efficient Sharing of RSA Functions,” J. Cryptology, vol. 20, no. 3, pp. 393-400, 2007.