Abstract
With the advent of IoT devices, cloud computing, accessible mobile devices, social networking sites and other advancements in technology a huge amount of data is being generated. NoSQL databases were evolved to provide a better storage capability, scalability, improved performance for read and write operations for the enormous data generated by various systems which are continuously being read and written by large number of users. Initially it was believed to provide better security in comparison to the traditional relational database management system (RDBMS), but in due course of time NoSQL databases were also exposed to various security breaches and vulnerabilities. In this paper we studied in detail the various security vulnerabilities of MongoDB, along with the need to secure the interfaces being used to access MongoDB. We analyzed the prevention and mitigation strategies for the same. The study of this paper can be used as a best practice to secure NoSQL or MongoDB database. It suggests how to secure the queries and all the interfaces that are being used to access the database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Brewer, E.A.: Towards robust distributed systems. In: PODC, vol. 7 (2000)
Db engines. https://db-engines.com/en/ranking. Accessed 02 Sept 2022
Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., Abramov, J.: Security Issues in NoSQL Databases. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 2011 (2011)
Sicari, S., Rizzardi, A., Coen-Porisini, A.: Security& privacy issues and challenges in NoSQL databases. Comput. Netw. Int. J. Comput. Telecommun. Netw. 206(C), 341 (2022)
Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NOSQL system vulnerabilities with big data. Int. J. Managing Inf. Technol. (IJMIT), 11(4), 1–19 (2019)
Ron, A., Shulman-Peleg, A., Puzanov, A.: Analysis and mitigation of NoSQL injections. IEEE Secur. Priv. 14(2), 30–39 (2016)
Zdnet. https://www.zdnet.com/article/chinese-companies-have-leaked-over-590-million-resumes-via-open-databases/. Accessed 02 July 2023
Bleeping computer. https://www.bleepingcomputer.com/news/security/russian-streaming-platform-confirms-data-breach-affecting-75m-users/. Accessed 09 July 2023
Bleeping computer. https://www.bleepingcomputer.com/news/security/over-275-million-records-exposed-by-unsecured-mongodb-database/. Accessed 09 July 2023
Cpomagazine. https://www.cpomagazine.com/cyber-security/toyota-connected-service-decade-long-data-leak-exposed-2-15-million-customers/. Accessed 18 July 2023
Bleeping computer. https://www.bleepingcomputer.com/news/security/redis-mongodb-and-elastic-2022-s-top-exposed-databases/. Accessed 18 July 2023
Imam, A.A., Basri, S., González-Aparicio, M.T., Balogun, A.O., Kumar, G.: NoInjection: preventing unsafe queries on NoSQL-document-model databases. In: 2nd International Conference on Computing and Information Technology (ICCIT) (2022)
Ron, A., Shulman-Peleg, A., Bronshtein, E: No SQL, No Injection? Examining NoSQL Security
Hou, B., Qian, K., Li, L., Shi, Y., Tao, L., Liu, J.: MongoDB NoSQL Injection Analysis and Detection. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), 2016 (2016)
A survey on detection and prevention of SQL and NoSQL injection attack on server-side applications. Int. J. Comput. Appl. (0975 - 8887), 183 (2021)
Invicti. https://www.invicti.com/blog/web-security/what-is-nosql-injection/. Accessed 07 Nov 2022
Spiegel, P.: NoSQL injection fun with objects and arrays (2022). https://owasp.org/www-pdf-archive/GOD16-NOSQL.pdf
Databases security issues - a short analysis on the emergent security problems generated by NoSQL databases. Economic Computation and Economic Cybernetics Studies and Research 53(3) (2019)
RodrÃguez, G.E., Torres, J.G., Flores, P., Benavides, D.E.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 166, 106960 (2020)
OWASP. https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/01-Testing_for_Weak_SSL_TLS_Ciphers_Insufficient_Transport_Layer_Protection. Accessed 28 July 2023
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_2
Qualys. https://blog.qualys.com/product-tech/2013/03/19/rc4-in-tls-is-broken-now-what. Accessed 09 July 2023
Zugaj, W., Beichler, A.S.: Analysis of standard security features for selected NoSQL systems. Am. J. Inf. Sci. Technol. (2019)
Meow attack. https://www.bleepingcomputer.com/news/security/new-meow-attack-has-deleted-almost-4-000-unsecured-databases/. Accessed 02 Oct 2023
Hackernoon. https://hackernoon.com/learnings-from-the-meow-bot-attack-on-our-mongodb-databases-y22q3zs8. Accessed 12 Oct 2023
Techtarget. https://www.techtarget.com/searchsecurity/news/252486971/Meow-attacks-continue-thousands-of-databases-deleted. Accessed 9 Oct 2023
Osborn, S.L., Servos, D., Shermin, M.: Issues in access control and privacy for big data. In: Meyers, R.A. (eds.) Encyclopedia of Complexity and Systems Science, pp. 1–9. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-642-27737-5_752-1
MongoDB docs. https://www.mongodb.com/docs/drivers/go/current/fundamentals/auth/. Accessed 22 June 2023
MongoDB manual. https://www.mongodb.com/docs/manual/. Accessed 22 June 2023
Ajayi, O.O., Adebiyi, T.O.: Application of data masking in achieving information privacy. IOSR J. Eng. (IOSRJEN) 4(2), 13–21 (2014)
Cuzzocrea, A., Shahriar, H.: Data masking techniques for NoSQL database security: a systematic review. In: 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA (2017)
Git hub Data masking. https://github.com/pkdone/mongo-data-masking. Accessed 06 July 2023
Mozilla docs. https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS. Accessed 18 July 2023
Lavrenovs, A., Melón, F.J.R.: HTTP security headers analysis of top one million websites. In: 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia (2018)
MongoDB manual. https://www.mongodb.com/docs/manual/core/security-transport-encryption/. Accessed 04 July 2023
MongoDB manual, CSFLE. https://www.mongodb.com/docs/manual/core/csfle/. Accessed 16 July 2023
CouchDB homepage. https://couchdb.apache.org/. Accessed 19 June 2023
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Dwivedi, S., Balaji, R., Ampatt, P., Sudarsan, S.D. (2023). A Survey on Security Threats and Mitigation Strategies for NoSQL Databases. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-49099-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49098-9
Online ISBN: 978-3-031-49099-6
eBook Packages: Computer ScienceComputer Science (R0)