Database Security Protection based on a New Mechanism
نویسندگان
چکیده
The database security is one of the important issues that should take a complete attention from researchers. Although applying the traditional security mechanisms, the database still violate from both of external and internal users. So, the researchers develop a Database Intrusion Detection System (DBIDS) to detect intrusion as soon as it occurs and override its malicious affects. The previous work developed a DBIDS as a third party product which is isolated from the DBMS security functions especially access controls. The lack of coordination and inter-operation between these two components prevent detecting and responding to ongoing attacks in real time, and, it causes high false alarm rate. On the other hand, one of the directions that are followed to build a profile is the data dependency model. Although this model is sufficient and related to the natural of database, it suffers from high false alarm rate. This means that it needs an enhancement to get its benefits and eliminate its drawbacks. This Paper aims to strengthen the database security via applying a DBID. To achieve this goal it develops an efficient IDS for DB and integrates it with DBMS for cooperation and completeness between the different parts in the security system. The experiments declare that the proposed model is an efficient DBIDS with a minimum false positive rate (nearly zero %) and maximum
منابع مشابه
Impact of Cash Transfer on Food Security: A Review
Cash transfer (CTs) is an increasingly popular social protection mechanism used by many developing countries to improve the food security and nutritional status of lower socio-economic groups. This paper is a review of the literature regarding the impact of CT programs on the food security of recipient households in the developing countries, including Iran. We looked for all original studies...
متن کاملCredential Purpose-based Access Control for Personal Data Protection
Web-based applications enable users to carry out their business transactions virtually at any time and place whereby users are required to disclose almost all their personal information which result in greater risks of information disclosure. Therefore, protecting personal information is of utmost importance. Enforcing personal information protection in databases requires controlled access to s...
متن کاملDatabase Security Architecture for Detection of Malicious Transactions in Database
The protection of the data over the database is some how mandatory for the organization, so there is a demand of the security mechanism to protect the database. Even the existing security measures at the database application level are not able to protect the database completely from some malicious actions and reason may be especially because of insider attack. The main objective here, is to des...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملDetection of Malicious User in Oracle 10g DBMS and Cost of Elimination
One major difficulty faced by organizations is the protection of data against malicious access. Six security mechanisms, namely, authentication, authorization, access control, auditing, encryption and integrity control are available in Oracle 10g database management systems (DBMS). These are implemented for protecting data. These typical database security mechanisms are not able to detect and h...
متن کاملA Lightweight Protocol to Robust TID-Based Anti-Counterfeiting
Electronic Product Code (EPC) Radio Frequency IDentification (RFID) tags support a costeffective anti-counterfeiting mechanism through the tag-specific and globally unique Transponder ID (TID). However, with the existence of customizable tags, this countermeasure could easily be bypassed as long as the TID codes are leaked through either physically opening genuine tags or unauthorizedly breachi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012