Open Access Open Access  Restricted Access Subscription or Fee Access

Multihand Administration with Intrusion Avoidance in Database System

S. Reshmi

Abstract


Data is the most crucial part of an organization. Most of the organizations focus only on protecting the data from external attacks but a greater damage can be done by insiders. Standard database security mechanisms, such as access control, authentication, and encryption are not much helpful when it comes to preventing data threat from insiders. To protect the data from insider threat this paper provides a novel approach called multihand administration on a database system. The core idea is to provide a service level public key for any major DDL actions. It can be achieved by the usage of DDL trigger technique. Correlation of private and public key usage among DBAs enables the database repository change. Thus it prevents the malicious modifications by authorized users and protects the data from insider attack. Key transfer is achieved using .net SMTP and it is tracked in the database repository. Initially the system will be considering anonymous user access and the system is secured by hiding necessary connection string information followed by profile loading concept. It is one of the latest .net skin and theme techniques. The system provides response to anonymous user authentication by using three levels including conservative, aggressive and fine grained.

 


Keywords


Databases, Intrusion Detection, Response, Insider Threat Prevention

Full Text:

PDF

References


D.Brackney, T.Goan,A.Ott, and L.Martin, “The Cyber Enemy within the countring threat from Malicious Insiders,” Proc. Ann.Computer Security Applications Conf. (ACSAC).pp.346-347, 2004.

.A Spalka, J Lehnhardt, “A comprehensive approach to anomaly detection in relational databases,”IFIP WG 11.3 Working Conference on Data and Applications Security, 2005.

R.B.Natan,”Implementing Database security and Auditing”. Digital Press, 2005.

A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous Access Patterns in Relational Databases,” J. Very Large DataBases (VLDB), vol. 17, no. 5, pp. 1063-1077, 2008.

A. Kamra and E. Bertino, “Design and Implementation of SAACS: A State-Aware Access Control System,” Proc. Ann. Computer Security Applications Conf. (ACSAC), 2009.

“Oracle Database Vault Administrator’s Guide11g Release1 (11.1), http://download.oracle.com/docs/cd/B28 59_01/ server.111/b31222/toc.htm, Jan. 2009.

Justin Myers, Michael R. Grimaila, Robert F. Mills, “Towards insider threat detection using web server logs”, ACM article, http://www.csiir.ornl.gov/csiirw/09/CSIIR W09-Proceedings/Abstracts/Myers-abstract.pdf, 2009.

Yaseen, Q, Panda, B,” Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention”, 2010.

A.Kamra and E. Bertino, “Design and Implementation of an Intrusion Response System for Relational Databases,” IEEE Transactions on Knowledge and Data Engineering, Vol.23, No.6, June 2011.

http://pentesting.sans.org/resources/papers/gcih/protecting-insider-attacks-108564.

http://www.webopedia.com/TERM/I/insider_attack.

http://technet.microsoft.com/enus/library/ms190989.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.