首页> 外文期刊>Knowledge and Data Engineering, IEEE Transactions on >Design and Implementation of an Intrusion Response System for Relational Databases
【24h】

Design and Implementation of an Intrusion Response System for Relational Databases

机译:关系数据库入侵响应系统的设计与实现

获取原文
获取原文并翻译 | 示例
           

摘要

The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues that we address in context of such response policies are that of policy matching, and policy administration. For the policy matching problem, we propose two algorithms that efficiently search the policy database for policies that match an anomalous request. We also extend the PostgreSQL DBMS with our policy matching mechanism, and report experimental results. The experimental evaluation shows that our techniques are very efficient. The other issue that we address is that of administration of response policies to prevent malicious modifications to policy objects from legitimate users. We propose a novel Joint Threshold Administration Model (JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs. We present design details of JTAM which is based on a cryptographic threshold signature scheme, and show how JTAM prevents malicious modifications to policy objects from authorized users. We also implement JTAM in the PostgreSQL DBMS, and report experimental results on the efficiency of our techniques.
机译:整个入侵检测系统的入侵响应组件负责对异常请求发出适当的响应。我们提出了数据库响应策略的概念,以支持针对DBMS量身定制的入侵响应系统。我们的交互式响应策略语言使数据库管理员可以很容易地根据异常请求的性质为不同的情况指定适当的响应操作。在此类响应策略的上下文中,我们要解决的两个主要问题是策略匹配和策略管理。对于策略匹配问题,我们提出了两种算法,可以有效地在策略数据库中搜索与异常请求匹配的策略。我们还使用策略匹配机制扩展了PostgreSQL DBMS,并报告了实验结果。实验评估表明,我们的技术非常有效。我们要解决的另一个问题是响应策略的管理,以防止合法用户对策略对象进行恶意修改。我们提出了一种基于职责分离原则的新型联合阈值管理模型(JTAM)。 JTAM中的关键思想是策略对象至少由k个数据库管理员(DBA)共同管理,也就是说,除非至少有k个DBA授权,否则对策略对象进行的任何修改都是无效的。我们将介绍基于密码阈值签名方案的JTAM的设计细节,并说明JTAM如何防止授权用户对策略对象进行恶意修改。我们还在PostgreSQL DBMS中实现JTAM,并报告有关我们技术效率的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号