Data-Base Security Using Different Techniques: A Survey

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :Abhijeet Sartape, Prof. Vasgi B. P

MLA

Abhijeet Sartape, Prof. Vasgi B. P "Data-Base Security Using Different Techniques: A Survey"International Journal of Computer Trends and Technology (IJCTT),V4(4):483-485 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -In many organizations, Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depend on Database Security, i.e. Insider attack detection. In this paper, mainly three insider attack detection techniques introduced are as follows Log examining, Query clustering & Policy-based mechanism. In Log examining approach given transaction of each user should be examined or tested for insider attack. In Query clustering approach external query (outlier) i.e. other than a cluster of query, should be detected. In policy-based mechanism, each user having its own policy data & if any policy violated, then it should be detected as an insider attack. These three approaches should perform database correlations for identifying malicious database transactions.

References-

[1] A.Conry-Murray,” The Threat from within. Network Computing (AUG. 2005),” , July 2009.
[2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” 2010.
[3] M. Nicolett and J. Wheatman, “Dam Technology Provides Monitoring and Analytics with Less Overhead. Gartner Research (Nov. 2007),” http://www.gartner.com, 2010.
[4] Yi Ru, Alina Campan, James Walden, Irina Vorobyeva, Justin Shelton, “An Effective Log Mining Approach For Database intrusion Detection *”, 978-1-4244-6588-0/10 IEEE, 2010.
[5] Srivastava, A, Sural S., and Majumdar, AK.: Database Intrusion Detection Using Weighted Sequence Mining, Journal of Computers, vol. 1, no. 4 (2006)
[6] Agrawal, R., Imieliilski, T., Swami, A: Mining association rules between sets of items in large databases, In Proceedings of the 1993 ACM SIGMOD international conference on Management of data (1993)
[7] Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, and Shambhu Upadhyaya, “A Data- Centric Approach to Insider Attack Detection in Database Systems”, S. Jha, R. Sommer, and C. Kreibich (Eds.): RAID 2010, LNCS 6307, pp. 382–401, 2010. Springer-Verlag Berlin Heidelberg 2010.
[8] Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. In: SIGMOD Conference, pp. 539–550 (2003).

Keywords — Database Security, Log Examining, Query Clustering, policy Based Mechanism.