Skip to main content

Intrusion Detection in Database Systems

  • Conference paper
Communication and Networking (FGCN 2010)

Abstract

Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy, pp. 120–128. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  2. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: IEEE Symposium on Security and Privacy (1991)

    Google Scholar 

  3. Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: 17th National Computer Security Conference (1994)

    Google Scholar 

  4. Noel, S., Wijesekera, D., Youman, C.: Modern intrusion detection, data mining, and degrees of attack guilt. In: Applications of Data Mining in Computer Security. Kluwer Academic, Dordrecht (2002)

    Google Scholar 

  5. Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivava, J., Kumar, V., Dokas, P.: The MINDS – Minnesota Intrusion Detection System. In: Next Generation Data Mining, MIT Press, Boston (2004)

    Google Scholar 

  6. Qin, M., Hwang, K.: Frequent episode rules for Internet traffic analysis and anomaly detection. In: IEEE Conference on Network Computing and Applications (NAC 2004). IEEE Press, New York (2004)

    Google Scholar 

  7. Chung, C.Y., Gertz, M., Levitt, K.: Demids: A Misuse Detection System for Database Systems. In: Integrity and Internal Control Information Systems: Strategic Views on the Need for Control, pp. 159–178. Kluwer Academic Publishers, Norwell (2000)

    Chapter  Google Scholar 

  8. Lee, V.C., Stankovic, J., Son, S.H.: Intrusion Detection in Real-Time Database Systems via Time Signatures. In: 6th IEEE Real Time Technology and Applications Symposium (RTAS 2000), p. 124 (2000)

    Google Scholar 

  9. Barbara, D., Goel, R., Jajodia, S.: Mining Malicious Data Corruption with Hidden Markov Models. In: 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England (2002)

    Google Scholar 

  10. Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: ACM Symposium on Applied Computing, pp. 711–716 (2004)

    Google Scholar 

  11. Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion Detection in RBAC-administered Databases. In: 21st Annual Computer Security Applications Conference, pp. 170–182 (2005)

    Google Scholar 

  12. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role Based Access Control: Towards a Unified Standard. In: 5th ACM Workshop on Role Based Access Control. (2000)

    Google Scholar 

  13. Karjoth, G.: Access Control with IBM tivoli Access Manager. ACM Transactions on Information and Systems Security (TISSEC) 6(2), 232–257 (2003)

    Article  Google Scholar 

  14. Srivastava, A., Sural, S., Majumdar, A.K.: Weighted Intra-transactional Rule Mining for Database Intrusion Detection. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 611–620. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Hashemi, S., Yang, Y., Zabihzadeh, D., Kangavari, M.: Detecting Intrusion Transactions in Databases Using Data Item Dependencies and Anomaly Analysis. Expert Systems J. 25(5) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Javidi, M.M., Sohrabi, M., Rafsanjani, M.K. (2010). Intrusion Detection in Database Systems. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17604-3_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17603-6

  • Online ISBN: 978-3-642-17604-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics