Home // DBKDA 2011, The Third International Conference on Advances in Databases, Knowledge, and Data Applications // View article


SQRM: An Effective Solution to Suspicious Users in Database

Authors:
Hua Dai
Xiaolin Qin
Guineng Zheng
Ziyue Li

Keywords: database security; survival database; suspicious user quarantine; invalid data recovery

Abstract:
Since traditional database mechanisms such as identity authentication and access control, can be fooled by authorized but malicious users, to solving the problems, three key techniques namely intrusion detection, damage quarantine and recovery are studied for decades to implement survival database systems. However, these techniques are all built on identification of malicious behaviors, which is much more complex, sluggish and inefficient than the identification of suspicious behaviors because the former need more evidence than the later. This paper proposes an effective security mechanism by focusing suspicious users, namely suspect quarantine and recovery method denoted as SQRM, to increase the attack resistance of databases. It isolates invalid data transparently from trustworthy users to prevent further damage by suspicious users suspected to be malicious, while still maintaining continued availability for their data access operations to minimize loss of productive work in the case of incidents that they are indeed innocent. And when they are proved innocent or malicious, all invalid data caused by them will be concurrently recovered. Using SQRM is sufficiently effective to improve the survivability for database.

Pages: 59 to 64

Copyright: Copyright (c) IARIA, 2011

Publication date: January 23, 2011

Published in: conference

ISSN: 2308-4332

ISBN: 978-1-61208-115-1

Location: St. Maarten, The Netherlands Antilles

Dates: from January 23, 2011 to January 28, 2011