Home // DBKDA 2011, The Third International Conference on Advances in Databases, Knowledge, and Data Applications // View article
SQRM: An Effective Solution to Suspicious Users in Database
Authors:
Hua Dai
Xiaolin Qin
Guineng Zheng
Ziyue Li
Keywords: database security; survival database; suspicious user quarantine; invalid data recovery
Abstract:
Since traditional database mechanisms such as identity authentication and access control, can be fooled by authorized but malicious users, to solving the problems, three key techniques namely intrusion detection, damage quarantine and recovery are studied for decades to implement survival database systems. However, these techniques are all built on identification of malicious behaviors, which is much more complex, sluggish and inefficient than the identification of suspicious behaviors because the former need more evidence than the later. This paper proposes an effective security mechanism by focusing suspicious users, namely suspect quarantine and recovery method denoted as SQRM, to increase the attack resistance of databases. It isolates invalid data transparently from trustworthy users to prevent further damage by suspicious users suspected to be malicious, while still maintaining continued availability for their data access operations to minimize loss of productive work in the case of incidents that they are indeed innocent. And when they are proved innocent or malicious, all invalid data caused by them will be concurrently recovered. Using SQRM is sufficiently effective to improve the survivability for database.
Pages: 59 to 64
Copyright: Copyright (c) IARIA, 2011
Publication date: January 23, 2011
Published in: conference
ISSN: 2308-4332
ISBN: 978-1-61208-115-1
Location: St. Maarten, The Netherlands Antilles
Dates: from January 23, 2011 to January 28, 2011