DocumentCode :
1309534
Title :
Design and Implementation of an Intrusion Response System for Relational Databases
Author :
Kamra, Ashish ; Bertino, Elisa
Author_Institution :
Sch. of Electr. & Comput. Eng., Purdue Univ., Sunnyvale, CA, USA
Volume :
23
Issue :
6
fYear :
2011
fDate :
6/1/2011 12:00:00 AM
Firstpage :
875
Lastpage :
888
Abstract :
The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. We propose the notion of database response policies to support our intrusion response system tailored for a DBMS. Our interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues that we address in context of such response policies are that of policy matching, and policy administration. For the policy matching problem, we propose two algorithms that efficiently search the policy database for policies that match an anomalous request. We also extend the PostgreSQL DBMS with our policy matching mechanism, and report experimental results. The experimental evaluation shows that our techniques are very efficient. The other issue that we address is that of administration of response policies to prevent malicious modifications to policy objects from legitimate users. We propose a novel Joint Threshold Administration Model (JTAM) that is based on the principle of separation of duty. The key idea in JTAM is that a policy object is jointly administered by at least k database administrator (DBAs), that is, any modification made to a policy object will be invalid unless it has been authorized by at least k DBAs. We present design details of JTAM which is based on a cryptographic threshold signature scheme, and show how JTAM prevents malicious modifications to policy objects from authorized users. We also implement JTAM in the PostgreSQL DBMS, and report experimental results on the efficiency of our techniques.
Keywords :
SQL; cryptography; digital signatures; relational databases; DBMS; PostgreSQL DBMS; cryptographic threshold signature scheme; database response policies; interactive response policy language; intrusion detection response system; joint threshold administration model; policy administration; policy matching problem; relational databases; Authentication; Context; Databases; Engines; Organizations; Protocols; Databases; intrusion detection; policies; prevention; response; threshold signatures.;
fLanguage :
English
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
1041-4347
Type :
jour
DOI :
10.1109/TKDE.2010.151
Filename :
5560655
Link To Document :
بازگشت