首页> 外文会议>Pacific Rim International Conference Dependable Computing >Monitoring Database Application Behavior for Intrusion Detection
【24h】

Monitoring Database Application Behavior for Intrusion Detection

机译:监控数据库应用程序行为进行入侵检测

获取原文

摘要

Database management systems (DBMS) represent the ultimate layer in preventing malicious data access or corruption and implement several security mechanisms to protect data. However these mechanisms cannot always stop malicious users from accessing data by exploiting system vulnerabilities. The aim of this paper is to propose an intrusion detection mechanism for DBMS to fill this gap. Our approach consists of a comprehensive representation of user database utilization profiles to perform concurrent intrusion detection. Prior to the detection it is necessary to define and learn these utilization profiles. Profiles are defined using a three level abstraction and learned directly from monitoring the database utilization in real conditions. The proposed mechanism is generic and can be easily implemented in commercial and open-source DBMS.
机译:数据库管理系统(DBMS)表示防止恶意数据访问或损坏以及实现若干安全机制以保护数据的最终层。但是,这些机制不能始终阻止恶意用户通过利用系统漏洞来访问数据。本文的目的是提出DBMS的入侵检测机制来填补这种差距。我们的方法包括全面的用户数据库利用率配置文件来执行并发入侵检测。在检测之前,有必要定义和学习这些利用率配置文件。配置文件是使用三级抽象定义的,并直接学习免于监视实际条件中的数据库利用率。所提出的机制是通用的,可以在商业和开源DBMS中轻松实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号