A.Nushrath Fathima1 & S.Sheik Faritha Begum2
M.E/CSE Assistant Professor/CSE,
C.Abdul Hakeem College Of C.Abdul Hakeem College Of
Engineering & Technology, Engineering & Technology,
Melvisharam. Melvisharam.
Abstract
Intrusion handling mechanism has two components such as intrusion detection and response system.Response system issues suitable response to anomalous requests.The request is given in the form of response policies.The main problem in the response system is the administration of such policies.Here we propose a novel Joint Threshold Administration Model(JTAM) based on the principle of separation of duty.The key concept behind this JTAM is that a policy object is jointly administered by atleast k database administrators and changes made to a policy should be validated by those k administrators to become validated.
Index Terms
Databases, intrusion detection ,response, prevention, policies, threshold signatures, separation of duties.
Introduction
The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon
References: [1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),” http://www.networkcomputing.com/showArticle. [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010. [3] A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous Access Patterns in Relational Databases,” J. Very Large DataBases (VLDB), vol. 17, no. 5, pp. 1063-1077, 2008. [4] A. Kamra, E. Bertino, and R.V. Nehme, “Responding to Anomalous Database Requests,” Secure Data Management, 2008 [5] V [6] C.K. Koc, “High-Speed RSA Implementation,” Technical Report tr-201, Version 2.0, RSA Laboratories, 1994. [7] M.K. Aguilera, R.E. Strom, D.C. Sturman, M. Astley, and T.D. Chandra, “Matching Events in a Content-Based Subscription System,” Proc. Symp. Principles of Distributed Computing (PODC), pp. 53-61, 1999. [8] J.A. Pereira, F. Fabret, F. Llirbat, and D. Shasha, “Efficient Matching for Web-Based Publish/Subscribe Systems,” Proc. Int’l Conf. Cooperative Information Systems (CooplS), pp. 162-173, 2000.