作者: Ulf T. Mattsson
DOI:
关键词: Engineering 、 Intrusion detection system 、 Intrusion tolerance 、 Host (network) 、 Database security 、 Computer security 、 Isolation (database systems) 、 Host-based intrusion detection system 、 Access control 、 Database 、 Database testing
摘要: Modern intrusion detection systems are comprised of three basically different approaches, host based, network and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial market for number years now because they simple to use, understand maintain. However, fall prey shortcomings such as scaling with increased traffic requirements, use complex false positive prone signature databases, their inability detect novel intrusive attempts. This system interacts access control deny further when occurs represent practical implementation addressing these other concerns. paper presents an overview our work creating database system. Based on many Database Security Research, proposed solution detects wide range specific general forms misuse, provides detailed reports, has low false-alarm rate. Traditional implementations security mechanisms very limited defending successful data attacks. Authorized but malicious transactions can make useless by impairing its integrity availability. offers ability misuse subversion through direct monitoring operations inside host, providing important complement host-based network-based surveillance. Suites may be deployed throughout network, alarms managed, correlated, acted remote or local subscribing services, thus helping address issues decentralized management.