Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Intrusion Detection in Database Systems

  • Conference paper

Abstract

Data represent today a valuable asset for organizations and companies and must be protected. Ensuring the security and privacy of data assets is a crucial and very difficult problem in our modern networked world. Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. One mechanism to safeguard the information in these databases is to use an intrusion detection system (IDS). The purpose of Intrusion detection in database systems is to detect transactions that access data without permission. In this paper several database Intrusion detection approaches are evaluated.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy, pp. 120–128. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  2. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: IEEE Symposium on Security and Privacy (1991)

    Google Scholar 

  3. Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: 17th National Computer Security Conference (1994)

    Google Scholar 

  4. Noel, S., Wijesekera, D., Youman, C.: Modern intrusion detection, data mining, and degrees of attack guilt. In: Applications of Data Mining in Computer Security. Kluwer Academic, Dordrecht (2002)

    Google Scholar 

  5. Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivava, J., Kumar, V., Dokas, P.: The MINDS – Minnesota Intrusion Detection System. In: Next Generation Data Mining, MIT Press, Boston (2004)

    Google Scholar 

  6. Qin, M., Hwang, K.: Frequent episode rules for Internet traffic analysis and anomaly detection. In: IEEE Conference on Network Computing and Applications (NAC 2004). IEEE Press, New York (2004)

    Google Scholar 

  7. Chung, C.Y., Gertz, M., Levitt, K.: Demids: A Misuse Detection System for Database Systems. In: Integrity and Internal Control Information Systems: Strategic Views on the Need for Control, pp. 159–178. Kluwer Academic Publishers, Norwell (2000)

    Chapter  Google Scholar 

  8. Lee, V.C., Stankovic, J., Son, S.H.: Intrusion Detection in Real-Time Database Systems via Time Signatures. In: 6th IEEE Real Time Technology and Applications Symposium (RTAS 2000), p. 124 (2000)

    Google Scholar 

  9. Barbara, D., Goel, R., Jajodia, S.: Mining Malicious Data Corruption with Hidden Markov Models. In: 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England (2002)

    Google Scholar 

  10. Hu, Y., Panda, B.: A Data Mining Approach for Database Intrusion Detection. In: ACM Symposium on Applied Computing, pp. 711–716 (2004)

    Google Scholar 

  11. Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion Detection in RBAC-administered Databases. In: 21st Annual Computer Security Applications Conference, pp. 170–182 (2005)

    Google Scholar 

  12. Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role Based Access Control: Towards a Unified Standard. In: 5th ACM Workshop on Role Based Access Control. (2000)

    Google Scholar 

  13. Karjoth, G.: Access Control with IBM tivoli Access Manager. ACM Transactions on Information and Systems Security (TISSEC) 6(2), 232–257 (2003)

    Article  Google Scholar 

  14. Srivastava, A., Sural, S., Majumdar, A.K.: Weighted Intra-transactional Rule Mining for Database Intrusion Detection. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 611–620. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Hashemi, S., Yang, Y., Zabihzadeh, D., Kangavari, M.: Detecting Intrusion Transactions in Databases Using Data Item Dependencies and Anomaly Analysis. Expert Systems J. 25(5) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Shahid Bahonar University of Kerman, Kerman, Iran

    Mohammad M. Javidi, Mina Sohrabi & Marjan Kuchaki Rafsanjani

Authors
  1. Mohammad M. Javidi

    You can also search for this author inPubMed Google Scholar

  2. Mina Sohrabi

    You can also search for this author inPubMed Google Scholar

  3. Marjan Kuchaki Rafsanjani

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Hannam University, Daejeon, South Korea

    Tai-hoon Kim

  2. University of Western Macedonia, Kozani, Greece

    Thanos Vasilakos

  3. Faculty of Information Science and Electrical Engineering, Kyushu University, 6-10-1 Hakozaki, 812-8581, Fukuoka, Japan

    Kouichi Sakurai

  4. The University of Alabama, Tuscaloosa, AL, USA

    Yang Xiao

  5. Sun Yat-sen University, 510275, Guangzhou, P.R. China

    Gansen Zhao

  6. University of Warsaw & Infobright Inc., Poland

    Dominik Ślęzak

Rights and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Javidi, M.M., Sohrabi, M., Rafsanjani, M.K. (2010). Intrusion Detection in Database Systems. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_10

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp