2014
DOI: 10.1145/2694428.2694435
|View full text |Cite
|
Sign up to set email alerts
|

Approaches and Challenges in Database Intrusion Detection

Abstract: Databases often support enterprise business and store its secrets. This means that securing them from data damage and information leakage is critical. In order to deal with intrusions against database systems, Database Intrusion Detection Systems (DIDS) are frequently used. This paper presents a survey on the main database intrusion detection techniques currently available and discusses the issues concerning their application at the database server layer. The identified weak spots show that most DIDS inadequat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…In summary, existing IDSs cannot cope with the dynamic nature of the currently developing attack types [13][14][15][16][17][18][19].…”
Section: Challenge Of Idssmentioning
confidence: 99%
“…In summary, existing IDSs cannot cope with the dynamic nature of the currently developing attack types [13][14][15][16][17][18][19].…”
Section: Challenge Of Idssmentioning
confidence: 99%
“…Intrusion detection methods can be roughly clustered into two basic categories: rules-based and learning-based methods (Santos, Bernardino, and Vieira 2014 , while not strictly a subset of anomaly or intrusion detection, is of some relevance to the temporal setting. Another natural approach is to model the temporal process via a Markov Model or a Hidden Markov Model, as was done in Görnitz, Braun, and Kloft; Soule et al (2015; 2005).…”
Section: Related Workmentioning
confidence: 99%
“…There has been extensive level of research in detecting data leakage from databases, but there are still challenges in this field [33]. Chung et al [34] proposed the use of access patterns to databases to detect typical behavior of users.…”
Section: Related Workmentioning
confidence: 99%