Abstract
Database intrusion detection has been an important research area in database security. It focuses on malicious transaction attacks, which cannot be handled by traditional database security mechanisms, such as authorization, access control, integrity control, and so on. Although there have appeared some intrusion detection systems, current researches on malicious transaction detection are limited in accuracy and efficiency. Inspired by natural immune system, we propose a novel immunity-based intrusion detection solution for database system in this paper. It provides an additional layer of defense against DBMS misuse, especially malicious transactions. The ability to learn and to adapt to the environment dynamically entitles the system to detect both known and unknown malicious transaction intrusions efficiently. Simulations show that the database intrusion detection system based on data immunity can accelerate detection of malicious transaction attacks and improve its accuracy without causing any other performance penalty.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Paul, A., Sushil, J., Peng, L.: Recovery from malicious transactions. IEEE transactions on knowledge and data engineering 14(5), 1167–1185 (2002)
Chung, C.Y., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems. In: Proc. of Third International IFIP TC-11 WG11.5 Working Conference on integrity and Internal Control in Information Systems, pp. 159–178. Kluwer Academic Publishers, Amsterdam (1999)
Rakesh, A., Ramakrishnan, S.: Fast algorithms for mining association rules. In: Proc. of 20th International Conference on Very Large Data Bases, pp. 487–499. Morgan Kaufmann, Berlin (1994)
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proc. 2001 IEEE Symposium on Security and Privacy, pp. 130–143. IEEE Computer Society, Oakland (2001)
Peng, L.: DAIS: A real-time data attack isolation system for commercial database applications. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 219–229. IEEE Press, New Orleans (2001)
Rao, X., Dong, C.X., Yang, S.Q.: An intrusion detection system based on support vector machine. Journal of Software 14(4), 798–803 (2001) (in Chinese with English abstract)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, K., Chen, G., Dong, J. (2005). An Immunity-Based Intrusion Detection Solution for Database Systems. In: Fan, W., Wu, Z., Yang, J. (eds) Advances in Web-Age Information Management. WAIM 2005. Lecture Notes in Computer Science, vol 3739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11563952_79
Download citation
DOI: https://doi.org/10.1007/11563952_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29227-2
Online ISBN: 978-3-540-32087-6
eBook Packages: Computer ScienceComputer Science (R0)