Skip to main content

An Immunity-Based Intrusion Detection Solution for Database Systems

  • Conference paper
Advances in Web-Age Information Management (WAIM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3739))

Included in the following conference series:

Abstract

Database intrusion detection has been an important research area in database security. It focuses on malicious transaction attacks, which cannot be handled by traditional database security mechanisms, such as authorization, access control, integrity control, and so on. Although there have appeared some intrusion detection systems, current researches on malicious transaction detection are limited in accuracy and efficiency. Inspired by natural immune system, we propose a novel immunity-based intrusion detection solution for database system in this paper. It provides an additional layer of defense against DBMS misuse, especially malicious transactions. The ability to learn and to adapt to the environment dynamically entitles the system to detect both known and unknown malicious transaction intrusions efficiently. Simulations show that the database intrusion detection system based on data immunity can accelerate detection of malicious transaction attacks and improve its accuracy without causing any other performance penalty.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Paul, A., Sushil, J., Peng, L.: Recovery from malicious transactions. IEEE transactions on knowledge and data engineering 14(5), 1167–1185 (2002)

    Article  Google Scholar 

  2. Chung, C.Y., Gertz, M., Levitt, K.: Demids: a misuse detection system for database systems. In: Proc. of Third International IFIP TC-11 WG11.5 Working Conference on integrity and Internal Control in Information Systems, pp. 159–178. Kluwer Academic Publishers, Amsterdam (1999)

    Google Scholar 

  3. Rakesh, A., Ramakrishnan, S.: Fast algorithms for mining association rules. In: Proc. of 20th International Conference on Very Large Data Bases, pp. 487–499. Morgan Kaufmann, Berlin (1994)

    Google Scholar 

  4. Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proc. 2001 IEEE Symposium on Security and Privacy, pp. 130–143. IEEE Computer Society, Oakland (2001)

    Google Scholar 

  5. Peng, L.: DAIS: A real-time data attack isolation system for commercial database applications. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 219–229. IEEE Press, New Orleans (2001)

    Google Scholar 

  6. Rao, X., Dong, C.X., Yang, S.Q.: An intrusion detection system based on support vector machine. Journal of Software 14(4), 798–803 (2001) (in Chinese with English abstract)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, K., Chen, G., Dong, J. (2005). An Immunity-Based Intrusion Detection Solution for Database Systems. In: Fan, W., Wu, Z., Yang, J. (eds) Advances in Web-Age Information Management. WAIM 2005. Lecture Notes in Computer Science, vol 3739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11563952_79

Download citation

  • DOI: https://doi.org/10.1007/11563952_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29227-2

  • Online ISBN: 978-3-540-32087-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics