Sayali Pradeep Joshi, Mihir Thuse, Snehal Bhongale, Pranav Paranjpe
Dept. of Computer Engineering
Marathwada Mitra Mandal’s College of Engineering
Pune 411052, India jsayali92@gmail.com, mihir.thuse@gmail.com, snehalbhongale@gmail.com, pranav707@gmail.com
Abstract— The need for secure data storage has become a necessity of our time. Medical records, financial records, and legal information are all in need of secure storage. In the era of globalization and dynamic world economies, data outsourcing is inevitable. Security is major concern in data outsourcing environment, since data is under the custody of third party web servers. In present systems, third party can access and view data even though they are not authorized to do so, allowing the employee of the organization to update the database. This may lead to serious data theft, tampering or data leakages causing severe business loss to data owner. In this project we have proposed a novel solution to detect the database intrusion using Log Mining approach. Log files are unalterable files at runtime, automatically created by Web servers to have trace of the transactions performed on any web applications. Considering purchaser database at server-side and by comparing this with the transactions traced from log files, we can detect database tampering for any indifference found. Finally by using dynamic management view of SQL we can find who altered what data field and when. Our project thus provides hassle-free solution for server-side database intrusion.
Keywords— Intrusion, Log-mining, MD5, database, web-application
INTRODUCTION
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion
References: [1] An Effective Log Mining Approach for Database Intrusion Detection, Yi Ru, Alina Campan, James Walden, Irina Vorobyeva, Justin Shelton. Computer Science Department, Northern Kentucky University [2] Storage-Based Intrusion Detection for Storage Area Networks (SANs), Mohammad Banikazemi Dan Poff Bulent Abali. Thomas J. Watson Research Center, IBM Research, Yorktown Heights. [3] Hu, Y., and Panda, B.: A Data Mining Approach for Database Intrusion Detection, In Proceedings of the 19th ACM Symposium on Applied Computing, Nicosia, Cyprus, 2008