[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11602897_40guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

D_DIPS: An Intrusion Prevention System for Database Security

Published: 10 December 2005 Publication History

Abstract

There is a growing security concern on the increasing number of databases that are accessible through the Internet because a variety of attacks do succeed to fool the existed database protection mechanisms in many applications. Defense-in-depth strategies like intrusion prevention is urgently needed for database security. Most of research on intrusion prevention focuses on preventing attacks on operating systems and computer networks. Few efforts have been put on database intrusion prevention. Design and implementation of a database intrusion prevention system D_DIPS is presented. The goal of D_DIPS is to detect attacks caused by malicious transactions and cancel them timely before they succeed. The D_DIPS prototype shows D_DIPS can detect and stop attacks of malicious transaction in real time with low false alarm rate.

References

[1]
Cholter, L.W., Narasimhan, P., Sterne, D., Balupari, R., Djahandari, K., Mani, A., Murphy, S.: IBAN: intrusion blocker based on active networks. In: Proceedings of DARPA Active Networks Conference and Exposition, pp. 182–192 (2002)
[2]
Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: a peer-to-peer approach to network intrusion detection and prevention. In: Proceedings of Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 226–231 (2003)
[3]
Ryutov T., Neuman C., Kim D., and Li Z. Integrated access control and intrusion detection for web servers IEEE transactions on parallel and distributed systems 2003 14 9 841-850
[4]
Sekar, R., Uppuluri, P.: Synthesizing fast intrusion prevention/detection system from high-level specifications. In: Proceedings of the 8th USENIX security symposium, Washington, D.C. (1999)
[5]
Stevens, J., Saniepour, S.: SecureDirect: proactive security through content based traffic control. In: Proceedings of 17th International Conference on Advanced Information Networking and Applications, pp. 704–709 (2003)
[6]
Ammann, P., Jajodia, S., McCollum, C.D., et al.: Surviving information warfare attacks on databases. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164–174 (1997)
[7]
Chung, C.Y., Gertz, M., Levitt, K.: DEMIDS: A misuse detection system for database systems. In: Proceedings of the 3rd International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, pp. 159–178 (1999)
[8]
Ingsriswang, S., Liu, P.: AAID: An application aware transaction-level database intrusion detection system. Technical Report, Dept. of Information Systems, UMBC (2001)
[9]
Lee S.Y., Low W.L., and Wong P.Y. Gollmann D., Karjoth G., and Waidner M. Learning fingerprints for a database intrusion detection system Computer Security - ESORICS 2002 2002 Heidelberg Springer 264-279
[10]
Lee, V., Stankovic, J., Son, S.: Intrusion detection in real-time database systems via time signatures. In: Proceedings of the 6th IEEE Sympoisum on Real Time Technology and Applications, pp. 124–133 (2000)
[11]
Low, W.L., Lee, S.Y., Teoh, P.: DIDAFIT:Detecting inrusion in databases through fingerprinting transactions. In: Proceedings of the 4th international conference on enterprise information system (ICEIS) (2002)
[12]
Shun W.H., Daniel, T.T.H.: A novel intrusion detection system model for securing web-based database systems. In: Proceedings - IEEE Computer Society’s International Computer Software and Applications Conference, pp. 249–254 (2001)
[13]
Stolfo, S., Fan, D., Lee, W., et al.: Credit card fraud detection using meta-learning: issues and initial results. In: Proceedings of AAAI Workshop: AI approach to fraud detection and risk management (1997)
[14]
Mattsson U.T. A practical implementation of a real-time intrusion prevention system for commercial enterprise databases: Management Information Systems Data Mining V: Data Mining, Text Mining and their Business Applications 2004 10 263-272
[15]
Mattsson, U.T.: A real-time intrusion prevention system for commercial enterprise databases and file systems. In: Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology, pp. 189–194 (2004)
[16]
Mattsson, U.T.: A real-time intrusion prevention system for enterprise databases, http://www.quest-pipelines.com/newsletter-v5/1104_B.htm

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings
Dec 2005
504 pages
ISBN:978-3-540-30934-5
DOI:10.1007/11602897
  • Editors:
  • Sihan Qing,
  • Wenbo Mao,
  • Javier López,
  • Guilin Wang

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 10 December 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media