Show simple item record

dc.contributor.authorNayeem, Fatima
dc.contributor.authorVijayakamal, M.
dc.date.accessioned2013-03-07T23:35:15Z
dc.date.available2013-03-07T23:35:15Z
dc.date.issued2012-12-01
dc.identifier.issn2277-5420
dc.identifier.urihttp://hdl.handle.net/10150/271494
dc.descriptionRelational databases are built on Relational Model proposed by Dr. E. F. Codd. The relational model has become a consistent and widely used DBMS in the world. The databases in this model are efficient in storing and retrieval of data besides providing authentication through credentials. However, there might be many other attacks apart from stealing credentials and intruding database. Adversaries may always try to intrude into the relational database for monetary or other gains [1]. The relational databases are subjected to malicious attacks as they hold the valuable business data which is sensitive in nature. Monitoring such database continuously is a task which is inevitable keeping the importance of database in mind. This is a strategy that is in top five database strategies as identified by Gartner research which are meant for getting rid of data leaks in organizations [2]. There are regulations from governments like US with respect to managing data securely. The data management like HIAPP, GLBA, and PCI etc. is mentioned in the regulations as examples.en_US
dc.description.abstractIntrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.
dc.language.isoenen_US
dc.publisherIJCSNen_US
dc.relation.ispartofseriesIJCSN-2012-1-6-46en_US
dc.relation.ispartofseries110en_US
dc.relation.urlhttp://ijcsn.org/IJCSN-2012/1-6/IJCSN-2012-1-6-46.pdfen_US
dc.subjectIntrusion detectionen_US
dc.subjectintrusion response systemen_US
dc.subjectpoliciesen_US
dc.subjectrelational databaseen_US
dc.titlePolicies Based Intrusion Response System for DBMSen_US
dc.typeTechnical Reporten_US
dc.contributor.departmentDept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, Indiaen_US
dc.contributor.departmentDept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, Indiaen_US
dc.identifier.journalInternational Journal of Computer Science and Network (IJCSN)en_US
refterms.dateFOA2018-04-24T17:37:34Z
html.description.abstractIntrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.


Files in this item

Thumbnail
Name:
IJCSN-2012-1-6-46.pdf
Size:
111.3Kb
Format:
PDF
Description:
Policies Based Intrusion Response ...

This item appears in the following Collection(s)

Show simple item record