Intrusion Detection System for Relational Databases

Jeya S*, S. Muthu Perumal Pillai**
* Professor & Head M.C.A. Department, PET Engineering College, Vallioor, Tamil Nadu, India.
** Assistant Professor, Department, PET Engineering College, Vallioor, Tamil Nadu, India.
Periodicity:April - June'2012
DOI : https://doi.org/10.26634/jse.6.4.1803

Abstract

Intrusion detection system for relational database is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues that we address in context of such response are that of data matching, and data administration. We propose a novel Joint Threshold Administration Model (JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs. We present design details of JTAM which is based on a cryptographic threshold signature scheme, and show how JTAM prevents malicious modifications to policy objects from authorized users. We also implement JTAM in the PostgreSQL DBMS, and report experimental results on the efficiency of our techniques.

Keywords

Databases, intrusion detection, response, prevention, threshold signatures.

How to Cite this Article?

Jeya S, and Muthu Perumal Pillai (2012). Intrusion Detection System for Relational Databases. i-manager’s Journal on Software Engineering, 6(4), 9-15. https://doi.org/10.26634/jse.6.4.1803

References

[1]. Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter and Eike Kohnert, (November 2010). “A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem”, IEEE Transactions On Computers, pp. 1533-1546, Vol. 59, No. 11.
[2]. Akrivi Vlachou, Christos Doulkeridis, Yannis Kotidis and Michalis Vazirgiannis, (December 2010). “Efficient Routing of Subspace Skyline Queries over Highly Distributed Data”, IEEE Transactions On Knowledge And Data Engineering, pp. 1694-1708, Vol. 22, No. 12.
[3]. Ashish Kamra and Elisa Bertino, (June 2011). “Design and Implementation of an Intrusion Response System for Relational Databases”, IEEE Transactions On Knowledge And Data Engineering, pp.875-888, Vol. 23, No. 6.
[4]. Bonatti P.A., J.L. De Coi, D. Olmedilla, and L. Sauro, (November 2010). “A Rule-Based Trust Negotiation System”, IEEE Transactions On Knowledge snd Data Engineering, pp. 1507-1514, Vol. 22, No. 11.
[5]. Brian Blake M , and Michael F. Nowlan, (June 2011). “Knowledge Discovery in Services (KDS): Aggregating Software Services to Discover Enterprise Mashups”, IEEE Transactions On Knowledge and Data Engineering, pp.889-901, Vol. 23, No. 6, June 2011.
[6]. Chun-I Fan, Ling-Ying Huang and Pei-Hsiu Ho, (September 2010). “Anonymous Multireceiver Identity- Based Encryption”, IEEE Transactions On Computers, pp. 1239- 1249, vol. 59, No. 9.
[7]. Claudia Marinica and Fabrice Guillet, (June 2010). “Knowledge-Based Interactive Postmining of Association Rules Using Ontologies”, IEEE Transactions On Knowledge And Data Engineering, pp. 784-798, Vol. 22, No. 6.
[8]. Domenico Ficara, Andrea Di Pietro, Stefano Giordano, Gregorio Procissi, Fabio Vitucci, and Gianni Antichi, (June 2011). “Differential Encoding of DFAs for Fast Regular Expression Matching”, IEEE/ACM Transactions On Networking, pp.683-694, Vol. 19, No. 3.
[9]. Dominik Fisch, Thiemo Gruber, and Bernhard Sick, (May 2011). “SwiftRule: Mining Comprehensible Classification Rules for Time Series Analysis”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 5.
[10]. Emilio Miguela, Pedro, Keith E. Brown, Yvan R. Petillot, and David M. Lane, May (2011). “Semantic Knowledge-Based Framework to Improve the Situation Awareness of Autonomous Underwater Vehicles”, IEEE Transactions Oon Knowledge and Data Engineering, pp.759-773, Vol. 23, No. 5.
[11]. Eric Hsueh-Chan Lu, Vincent S. Tseng, Member, IEEE, and Philip S. Yu, (June 2011). “Mining Cluster-Based Temporal Mobile Sequential Patterns in Location-Based Service Environments”, IEEE Transactions On Knowledge And Data Engineering, pp.914-927, Vol. 23, No. 6.
[12]. Hannes Frey and Ivan Stojmenovic, (September 2010). “On Delivery Guarantees and Worst-Case Forwarding Bounds of Elementar y Face Routing Components in Ad Hoc and Sensor Networks”, IEEE Transactions on Computers, pp.1224-1238, Vol. 59, No. 9.
[13]. Hua Lu, and Man Lung Yiu, (June 2011). “On Computing Farthest Dominated Locations”, IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 6.
[14]. Hyunjin Lee, Sangyeun Cho and Bruce R. Childers,( May 2010). “PERFECTORY: A Fault-Tolerant Directory Memory Architecture”, IEEE Transactions On Computers, pp. 638- 650, Vol. 59, No. 5,
[15]. Ioannis Hatzilygeroudis, and Jim Prentzas, (November 2010). “Integrated Rule-Based Learning and Inference”, IEEE Transactions On Knowledge And Data Engineering, pp. 1549-1563, Vol. 22, No. 11.
[16]. Irem Y. Tumer, and Carol S. Smidts, “Integrated Design-Stage Failure Analysis of Software-Driven Hardware Systems”, IEEE Transactions On Computers, pp.No.1072-1084, Vol. 60, No. 8, August 2011.
[17]. Javier Carretero, Xavier Vera, Pedro Chaparro, and Jaume Abella, (May 2010). “Microarchitectural Online Testing for Failure Detection in Memory Order Buffers”, IEEE Transactions On Computers, pp. 623-637, Vol. 59, No. 5.
[18]. Mahesh Balakrishnan, Tudor Marian, Kenneth P. Birman, Hakim Weatherspoon, and Lakshmi Ganesh, (June 2011). “Maelstrom: Transparent Error Correction for Communication Between Data Centers”, IEEE/ACM Transactions On Networking, pp.617-629, Vol. 19, No. 3.
[19]. Matt Duckham, Doron Nussbaum, (August 2011). “Efficient, Decentralized Computation of the Topology of Spatial Regions”, IEEE Transactions On Computers, Pg.No.1100-1113, Vol. 60, No. 8.
[20]. Mehran Mozaffari-Kermani and Arash Reyhani- Masoleh, (May 2010). “ Concurrent Structure- Independent Fault Detection Schemes for the Advanced Encryption Standard”, IEEE Transactions On Computers, pp.608-623, Vol. 59, No. 5.
[21]. Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham, (June 2011). “Classification and Novel Class Detection in Concept- Drifting Data Streams under Time Constraints”, IEEE Transactions On Knowledge and Data Engineering, pp.859-874, Vol. 23, No. 6.
[22]. Panagiotis Papadimitriou and Hector Garcia Molina, (January 2011). “Data Leakage Detection”, IEEE Transactions On Knowledge And Data Engineering, pp.51-64, Vol. 23, No. 1.
[23]. Rachid Hadjidj and Hanifa Boucheneb, (August 2011). “Efficient Reachability Analysis for Time Petri Nets”, IEEE Transactions on Computers, Vol. 60, No. 8.
[24]. Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang and Sushil Jajodia, (July 2010). “An Application-Level Data Transparent Authentication Scheme without Communication Overhead”, IEEE Transactions On Computers, pp. 943-954, Vol. 59, No. 7.
[25]. Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey G. Xie, and David A. Maltz, (June 2011). “Towards Systematic Design of Enterprise Networks”, IEEE/ACM Transactions On Networking, pp.695-707, Vol. 19, No. 3.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.