Preview

Intrusion Handling Mechanism

Powerful Essays
Open Document
Open Document
1821 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Handling Mechanism
Intrusion Handling Mechanism For Relational Databases

A.Nushrath Fathima1 & S.Sheik Faritha Begum2

M.E/CSE Assistant Professor/CSE,

C.Abdul Hakeem College Of C.Abdul Hakeem College Of

Engineering & Technology, Engineering & Technology,

Melvisharam. Melvisharam.

Abstract

Intrusion handling mechanism has two components such as intrusion detection and response system.Response system issues suitable response to anomalous requests.The request is given in the form of response policies.The main problem in the response system is the administration of such policies.Here we propose a novel Joint Threshold Administration Model(JTAM) based on the principle of separation of duty.The key concept behind this JTAM is that a policy object is jointly administered by atleast k database administrators and changes made to a policy should be validated by those k administrators to become validated.

Index Terms

Databases, intrusion detection ,response, prevention, policies, threshold signatures, separation of duties.

Introduction

The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon



References: [1] A. Conry-Murray, “The Threat from within. Network Computing (Aug. 2005),” http://www.networkcomputing.com/showArticle. [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010. [3] A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous Access Patterns in Relational Databases,” J. Very Large DataBases (VLDB), vol. 17, no. 5, pp. 1063-1077, 2008. [4] A. Kamra, E. Bertino, and R.V. Nehme, “Responding to Anomalous Database Requests,” Secure Data Management, 2008 [5] V [6] C.K. Koc, “High-Speed RSA Implementation,” Technical Report tr-201, Version 2.0, RSA Laboratories, 1994. [7] M.K. Aguilera, R.E. Strom, D.C. Sturman, M. Astley, and T.D. Chandra, “Matching Events in a Content-Based Subscription System,” Proc. Symp. Principles of Distributed Computing (PODC), pp. 53-61, 1999. [8] J.A. Pereira, F. Fabret, F. Llirbat, and D. Shasha, “Efficient Matching for Web-Based Publish/Subscribe Systems,” Proc. Int’l Conf. Cooperative Information Systems (CooplS), pp. 162-173, 2000.

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    • Describe the most prominent signs that a database attack has occurred. Discuss the steps one would take to recover from such an attack. Explain how such attacks can be prevented.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Organizations are under increased pressure to audit every action that a user performs within a database. This is due to increased focus on security, risk, accountability and avoidance of fraud and corruption. While security prevention measures (logins, firewalls, tokens etc.) are important to prevent unauthorized access to the data in the first place, as this survey shows, most breaches occur by users who are authorized but are either negligent or malicious.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The team began to consider how to prioritize security for the RDBMS to function. The RDBMS should be designed in a way that can offer security and protection to every piece of data saved within the architecture. This is crucial in assuring that the business remains competitive and meets client/customer confidence that sensitive data will not be exposed. These expectations could be meet only if users are sure that information being shared has not been altered or breached.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Sidpers

    • 2831 Words
    • 12 Pages

    Afyouni, Hassan, Database Security and Auditing, Protecting Data Integrity and Accessibility, 2006 Thomson Course Technology…

    • 2831 Words
    • 12 Pages
    Best Essays
  • Better Essays

    3. Database administrators from Aim Higher College’s central Information Technology (IT) group have contacted the security team noting that they are finding odd entries in a Web application’s backend database. Some of the entries appear to be SQL commands such as “UNION” and “JOIN” which cause them to think that an attacker is probing the Web application. What…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Anomalies

    • 337 Words
    • 2 Pages

    Data Anomalies Normalization is the process of splitting relations into well-structured relations that allow users to inset, delete, and update tuples without introducing database inconsistencies. Without normalization many problems can occur when trying to load an integrated conceptual model into the DBMS. These problems arise from relations that are generated directly from user views are called anomalies. There are three types of anomalies: update, deletion and insertion anomalies. An update anomaly is a data inconsistency that results from data redundancy and a partial update. For example, each employee in a company has a department associated with them as well as the student group they participate in. Employee_ID 123 234 345 456 567 Name J. Longfellow B. Rech B. Rech A. Bruchs A. Bruchs Department Accounting Marketing Marketing CIS CIS Student_Group Beta Alpha Psi Marketing Club Management Club Technology Org. Beta Alpha Psi…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Several intrusion detection models have been suggested. Denning’s (1986) IDES model forms the basis for several intrusion detection systems. Other approaches involve the use of agents for intrusion detection (Asaka, et al., 1999).…

    • 3306 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    project

    • 3294 Words
    • 14 Pages

    This is to certify that the project work entitled INTRUSION DETECTION SYSTEM being submitted by BIJENDRA SINGH…

    • 3294 Words
    • 14 Pages
    Powerful Essays