loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Ulf T. Mattsson

Affiliation: Protegrity, United States

Keyword(s): Isolation, Intrusion Tolerance, Database Security, Encryption, VISA CISP, GLBA, HIPAA.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; e-Commerce Security and Reliability Issues ; Identity Management ; Information and Systems Security ; Intrusion Detection & Prevention

Abstract: Modern intrusion detection systems are comprised of three basically different ap-proaches, host based, network based, and a third relatively recent addition called pro-cedural based detection. The first two have been extremely popular in the commercial market for a number of years now because they are relatively simple to use, understand and maintain. However, they fall prey to a number of shortcomings such as scaling with increased traffic requirements, use of complex and false positive prone signature databases, and their inability to detect novel intrusive attempts. This intrusion detection system interacts with the access control system to deny further access when detection occurs and represent a practical implementation addressing these and other concerns. This paper presents an overview of our work in creating a practical database intrusion detection system. Based on many years of Database Security Research, the proposed solution detects a wide range of specific and general fo rms of misuse, provides detailed reports, and has a low false-alarm rate. Traditional commercial implementations of database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its integrity and availability. The proposed solution offers the ability to detect misuse and subversion through the direct monitoring of database operations inside the database host, providing an important complement to host-based and network-based surveil-lance. Suites of the proposed solution may be deployed throughout a network, and their alarms man-aged, correlated, and acted on by remote or local subscribing security ser-vices, thus helping to address issues of decentralized management. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.160.243.44

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
T. Mattsson, U. (2004). A REAL-TIME INTRUSION PREVENTION SYSTEM FOR COMMERCIAL ENTERPRISE DATABASES. In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE; ISBN 972-8865-15-5; ISSN 2184-3236, SciTePress, pages 275-280. DOI: 10.5220/0001381102750280

@conference{icete04,
author={Ulf {T. Mattsson}.},
title={A REAL-TIME INTRUSION PREVENTION SYSTEM FOR COMMERCIAL ENTERPRISE DATABASES},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE},
year={2004},
pages={275-280},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001381102750280},
isbn={972-8865-15-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE
TI - A REAL-TIME INTRUSION PREVENTION SYSTEM FOR COMMERCIAL ENTERPRISE DATABASES
SN - 972-8865-15-5
IS - 2184-3236
AU - T. Mattsson, U.
PY - 2004
SP - 275
EP - 280
DO - 10.5220/0001381102750280
PB - SciTePress