首页> 外文期刊>Annual review of communications >A Real-Time Intrusion-Prevention System for Commercial Enterprise Databases and File Systems
【24h】

A Real-Time Intrusion-Prevention System for Commercial Enterprise Databases and File Systems

机译:商业企业数据库和文件系统的实时入侵防御系统

获取原文
获取原文并翻译 | 示例
       

摘要

Modern intrusion-detection systems are comprised of three basically different approaches, host-based, network-based, and a third relatively recent addition called procedural-based detection. The first two have been extremely popular in the commercial market for a number of years now because they are relatively simple to use, understand, and maintain. They fall prey, however, to a number of shortcomings such as scaling with increased traffic requirements, use of complex and false positive-prone signature databases, and their inability to detect novel intrusive attempts. This intrusion-detection system interacts with the access-control system to deny further access when detection occurs and represent a practical implementation addressing these and other concerns. This paper presents an overview of our work in creating a practical database intrusion-detection system. Based on many years of database security research, the proposed solution detects a wide range of specific and general forms of misuse, provides detailed reports, and has a low false-alarm rate. Traditional commercial implementations of database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its integrity and availability. The proposed solution offers the ability to detect misuse and subversion through the direct monitoring of database operations inside the database host, providing an important complement to host-based and network-based surveillance. Suites of the proposed solution may be deployed throughout a network, and their alarms managed, correlated, and acted on by remote or local subscribing security services, thus helping to address issues of decentralized management.
机译:现代入侵检测系统由三种基本不同的方法组成:基于主机,基于网络和第三种相对较新的方法,称为基于过程的检测。头两个在商业市场上已经非常流行了很多年,因为它们相对易于使用,理解和维护。但是,它们有很多缺点,例如随着流量需求的增加而扩展,使用复杂且错误的正向签名库,以及它们无法检测到新颖的入侵企图。该入侵检测系统与访问控制系统进行交互,以在检测到发生时拒绝进一步的访问,并且代表了解决这些问题和其他问题的实际实现。本文概述了我们在创建实用的数据库入侵检测系统中的工作。基于对数据库安全性的多年研究,提出的解决方案可以检测到广泛的特定和一般形式的滥用,提供详细的报告,并且误报率低。数据库安全机制的传统商业实现在防御成功的数据攻击方面非常有限。授权但恶意的交易会损害数据库的完整性和可用性,从而使数据库无用。所提出的解决方案提供了通过直接监视数据库主机内部的数据库操作来检测滥用和颠覆的能力,为基于主机和基于网络的监视提供了重要的补充。所提议解决方案的套件可以部署在整个网络中,并且可以通过远程或本地订阅安全服务来管理,关联它们的警报并采取措施,从而有助于解决分散管理的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号