Abstract
Existing database security mechanisms are not sufficient for detecting malicious activities targeted at corrupting data. With the increase of attacks toward database-centered applications, an effective intrusion detection system is essential for application security. Although someresearches havebeen done on the database intrusion detection, methods for detecting anomalous activitiesin databases haveonly recently been explored in detail. In this paper, we present an approach employing inter-transaction data dependency mining fordetecting well-crafted attacks thatconsists a group of seemingly harmless database transactions. Our experiments illustrated the advantage of this new approach and validated the effectiveness of the model proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
PGP Corporation’s 2006 annual study on the cost of data breaches. http://download.pgp.com/pdfs/Ponemon2-Breach-Survey_061020_F.pdf
Rietta, F.S. Application Layer Intrusion Detection for SQL Injection. In ACM Southeast Regional Conference, 2006.
Ramasubramanian, P., Kannan, A. Intelligent multi-agent based database hybrid intrusion prevention system. In ADBIS 2004, LNCS, vol. 3255, pp. 393-408. Springer, Heidelberg, 2004.
Valeur, F., Mutz, D., Vigna, G. A learning-based approach to the detection of SQL attacks. In DIMVA 2005, LNCS, vol. 3538, pp.123-140. Springer, Heidelberg, 2005.
Bertino, E., Kamra, A., Terzi, E., Vakali, A. Intrusion Detecton in RBAC-administered databases. In ACSAC, pp. 170-182. IEEE Computer Society Press, Los Alamitos, 2005.
Barbara, D., Goel, R., and Jajodia, S. Mining Malicious Data Corruption with Hidden Markov Models. In Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England, July 2002.
Chung, C., Gertz M., and Levitt, K. DEMIDS: A Misuse Detection System for Database Systems. In Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, pages 159-178, November 1999.
Lee, V. C.S., Stankovic, J. A., Son, S. H. Intrusion Detection in Real-time Database Systems Via Time Signatures. In Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium, 2000.
Hu, Y.and PandaB.A Data Mining Approach for Database Intrusion Detection.In Proceedings of the 19th ACM Symposium on Applied Computing, Nicosia, Cyprus, Mar. 2004.
Hu, Y.and PandaB.Design and Analysis of Techniques for Detection of MaliciousActivities in Database Systems.Journal of Network and Systems Management, Vol. 13, No. 3, Sep. 2005.
Srivastava, A.,Sural, S.,and Majumdar,A.Weighted Intra-transactional Rule Mining for Database Intrusion Detection. Advances in Knowledge Discovery and Data Mining. Vol. 3918, pp. 611-620, 2006.
Fonseca, J., Vieira, M., and Madeira H. Monitoring Database Application Behavior for Intrusion Detection. In Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing, 2006.
Agrawal, R. and Srikant, R. Mining Sequential Patterns. In Proceedings of the 1995 Int. Conf. Data Engineering, Taipei, Taiwan, March 1995. Pages 3 -14.
Acknowledgment
Research of Brajendra Panda has been supported in part by US AFOSR under grant FA 9550-04-1-0429. We are thankful to Dr. Robert. L. Herklotz for his support, which made this work possible
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Hu, Y., Panda, B. (2010). Mining Inter-transaction Data Dependencies for Database Intrusion Detection*. In: Sobh, T. (eds) Innovations and Advances in Computer Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3658-2_12
Download citation
DOI: https://doi.org/10.1007/978-90-481-3658-2_12
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3657-5
Online ISBN: 978-90-481-3658-2
eBook Packages: EngineeringEngineering (R0)