Search In this Thesis
   Search In this Thesis  
العنوان
Database security protection via intrusion detection /
المؤلف
Rezk, Amira Rezk Abdou.
هيئة الاعداد
باحث / أميرة رزق عبده رزق
مشرف / معوض المكاوي علي المكاوي
مشرف / هشام عرفات علي
مشرف / شريف ابراهيم بركات
الموضوع
Database security. Computer security. Computer networks - Security measures.
تاريخ النشر
2012.
عدد الصفحات
145 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
Computer Science (miscellaneous)
تاريخ الإجازة
01/01/2012
مكان الإجازة
جامعة المنصورة - كلية الحاسبات والمعلومات - Department of Information Systems
الفهرس
Only 14 pages are availabe for public view

from 145

from 145

Abstract

The database security is one of the important issues that should take a complete attention from researchers. To have a secure system a good security policy must be investigated carefully and a multilayered approach to security should be developed. Although applying the traditional security mechanisms, the database still violate from both of external and internal users. So, the researchers develop Database Intrusion Detection System (DBIDS) to follow other security mechanisms and detect intrusion as soon as it occurs to recover its malicious affects.
The previous work that done in DBIDS build it as a third party product which isolated from the DBMS security functions especially access controls. The lack of coordination and inter-operation between these two components prevents detecting and responding to ongoing attacks in real time, and, it causes high false alarm rate. On the other hand, one of the directions that are followed to build the profile is the data dependency model. Although this model is sufficient and related to the natural of database, it suffers from high false alarm rate. This means that it needs an enhancement to get its benefits and eliminate its drawbacks.
This thesis aims to strengthen the database security via applying a DBID. To achieve this goal, it develops an efficient IDS for DB based on enhanced data dependency model and integrates it with access control to override the high rate of false alarm and increase the detection rate. The experiments declare that the proposed model is an efficient DBIDS with a minimum FP rate (nearly zero %) and maximum TP rate (nearly 100%). Moreover, the proposed model introduces a novel method to build an accurate normal user profile and integrates it with access control.