首页> 外文学位 >An Adaptive Database Intrusion Detection System.
【24h】

An Adaptive Database Intrusion Detection System.

机译:自适应数据库入侵检测系统。

获取原文
获取原文并翻译 | 示例

摘要

Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent findings suggest that many have attempted to address this concern with the utilization of various detection methodologies in the areas of database authorization, security policy management and behavior analysis but have not been able to find an adequate solution to achieve the level of detection that is required.;While each of these methodologies has been addressed on an individual basis, there has been very limited work to address the methodologies as a single entity in an attempt to function within the detection environment in a harmonious fashion. Authorization is at the heart of most database implementations however, is not enough to prevent a rogue, authorized entity from instantiating a malicious action. Similarly, eliminating the current security policies only exacerbates the problem due to a lack of knowledge in a fashion when the policies have been modified. The behavior of the authorized entity is the most significant concern in terms of intrusion detection. However, behavior identification methodologies alone will not produce a complete solution. The detection of the insider threat during database access by merging the individual intrusion detection methodologies as noted will be investigated.;To achieve the goal, this research is proposing the creation of a procedural framework to be implemented as a precursor to the effecting of the data retrieval statement. The intrusion model and probability thresholds will be built utilizing the intrusion detection standards as put forth in research and industry. Once an intrusion has been indicated, the appropriate notifications will be distributed for further action by the security administrator while the transaction will continue to completion.;This research is proposing the development of a Database Intrusion Detection framework with the introduction of a process as defined in this research, to be implemented prior to data retrieval. This addition will enable an effective and robust methodology to determine the probability of an intrusion by the authorized entity, which will ultimately address the insider threat phenomena.
机译:在考虑数据库和授权实体时尝试采用当前方法时,很难完成入侵检测。众所周知,当前的方法论着重于网络体系结构而不是数据库,这在考虑内部威胁时不是一个适当的解决方案。最新发现表明,许多人试图通过在数据库授权,安全策略管理和行为分析领域中使用各种检测方法来解决此问题,但未能找到合适的解决方案来达到所需的检测级别虽然这些方法中的每一种都是单独解决的,但是将这些方法作为单个实体来解决的工作非常有限,以试图在检测环境中以和谐的方式发挥作用。但是,授权是大多数数据库实现的核心,还不足以防止流氓授权实体实例化恶意行为。同样,消除当前的安全策略只会由于修改策略时缺乏知识而加剧了问题。在入侵检测方面,授权实体的行为是最重要的问题。但是,仅行为识别方法并不能提供完整的解决方案。将研究通过合并提到的各个入侵检测方法来检测数据库访问期间的内部威胁。为了实现这一目标,本研究建议创建一个程序框架,以实现数据影响的前兆。检索语句。入侵模型和概率阈值将利用研究和行业中提出的入侵检测标准来构建。一旦指示了入侵,安全管理员将分发适当的通知以采取进一步措施,同时事务将继续完成。这项研究提出了数据库入侵检测框架的开发,其中引入了定义于这项研究要在数据检索之前实施。此添加将使有效且健壮的方法能够确定授权实体的入侵可能性,从而最终解决内部威胁现象。

著录项

  • 作者

    Barrios, Rita M.;

  • 作者单位

    Nova Southeastern University.;

  • 授予单位 Nova Southeastern University.;
  • 学科 Information Technology.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 109 p.
  • 总页数 109
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号