Efficient Implementation of Insider and Outsider Activity Response System for RDB
- MALLIKHARJUNA RAO J
- G.K.Sandhia
Intrusion detection, Intrusion response system, HMAC, DataBase, Threshold Signatures
In every organization data is crucial part. Organization have shown interest in DB monitoring and intrusion detection. Every organization protect data from the outsider attacks by using different security techniques, such as authentication, access permissions. But detecting the insider attacks on the database is difficult. To protect data from insider attack this paper provides a approach on a DBS is called multi hand administration. Policy languages are used to DBA detecting the anomalous request and take the appropriate actions based on the nature of anomaly request. To support intrusion response system these proposed database response policies are adapted to DBMS. The two main issues that are considered in this system is policy matching and policy administration. For policy matching propose two algorithms they effectively search the policy DB for policies that alike an anomalous request. The other problem is administration of response policies to avoid the malicious changes to policy objects from valid users. To avoid policy administration problem a novel Joint Threshold Administration Model (JTAM) is used. JTAM is based on the standard of partition of duty. The main idea following the JTAM is policy object is together administrated by at least k-DBAs, if any modification done to the policy object is invalid except it authorized by minimum k-DBAs.JTAM is based on the Cryptographic threshold signature scheme. HMAC is use to provide Integrity to the data.
MALLIKHARJUNA RAO J, G.K.Sandhia. "Efficient Implementation of Insider and Outsider Activity Response System for RDB".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.2, Issue 1, pp.1082-1087, URL :https://rjwave.org/ijedr/papers/IJEDR1401193.pdf
Volume 2 Issue 1
Pages. 1082-1087