Methodology for Detecting Advanced Persistent Threats in Oracle Databases
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as en...
Gespeichert in:
Veröffentlicht in: | International journal of strategic information technology and applications 2014-01, Vol.5 (1), p.42-53 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 53 |
---|---|
container_issue | 1 |
container_start_page | 42 |
container_title | International journal of strategic information technology and applications |
container_volume | 5 |
creator | Ray, Loye L Felch, Henry |
description | Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that may be hiding or operating deep within an Oracle database system. Using a deep understanding of Oracle normal operations provides a baseline to assist in discovering APT behavior. Incorporating these into a database intrusion detection system can raise the ability for finding these threats. |
doi_str_mv | 10.4018/ijsita.2014010104 |
format | Article |
fullrecord | <record><control><sourceid>gale_cross</sourceid><recordid>TN_cdi_crossref_primary_10_4018_ijsita_2014010104</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A761115121</galeid><sourcerecordid>A761115121</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2918-8bf1abd41d4f4cfcee51b8f0bd5adef6cbadc100ed20973b98d24208148f7d573</originalsourceid><addsrcrecordid>eNqNkUFr3TAMgMNYYaXrD9gtxw32OimxE-f4aLe20NEeurNxbDnPjzR5s5xB_3090nWHbTAJZBk-yeCvKN4hnAlA9SnsOSRzVgHma07xqjjGTrSbGqF7_auHTr4pTpn3kEOKtmnhuLj-Smk3u3mch8fSz7G8oEQ2hWkot-6HmSy58o4iB040pfJ-F8kkLsNU3kZjRyovTDK9YeK3xZE3I9Pp83lSfPvy-f78anNze3l9vr3Z2KpDtVG9R9M7gU54Yb0lktgrD72TxpFvbG-cRQByFXRt3XfKVaIChUL51sm2Piner3sPcf6-ECf9ENjSOJqJ5oU1Ng0AoqrUf6AVQAtS1hn9uKKDGUn3C4eJOBcOwy7xYBZmvW0bRJRYYcZxxW2cmSN5fYjhwcRHjaB_OtGrE_3bSZ75sM6EIej9vMQpf9OfnD44n9nLv7DPnnT2pF886ezpn4_K-glPtKai</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1620070553</pqid></control><display><type>article</type><title>Methodology for Detecting Advanced Persistent Threats in Oracle Databases</title><source>Alma/SFX Local Collection</source><creator>Ray, Loye L ; Felch, Henry</creator><creatorcontrib>Ray, Loye L ; Felch, Henry</creatorcontrib><description>Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that may be hiding or operating deep within an Oracle database system. Using a deep understanding of Oracle normal operations provides a baseline to assist in discovering APT behavior. Incorporating these into a database intrusion detection system can raise the ability for finding these threats.</description><identifier>ISSN: 1947-3095</identifier><identifier>EISSN: 1947-3109</identifier><identifier>DOI: 10.4018/ijsita.2014010104</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Analysis ; Computer information security ; Computer programs ; Computer software industry ; Computers ; Detection ; Human resource departments ; Intrusion ; Methodology ; Methods ; Organizations ; Risk ; Security management ; Software ; Technology application</subject><ispartof>International journal of strategic information technology and applications, 2014-01, Vol.5 (1), p.42-53</ispartof><rights>COPYRIGHT 2014 IGI Global</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2918-8bf1abd41d4f4cfcee51b8f0bd5adef6cbadc100ed20973b98d24208148f7d573</citedby><cites>FETCH-LOGICAL-c2918-8bf1abd41d4f4cfcee51b8f0bd5adef6cbadc100ed20973b98d24208148f7d573</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Ray, Loye L</creatorcontrib><creatorcontrib>Felch, Henry</creatorcontrib><title>Methodology for Detecting Advanced Persistent Threats in Oracle Databases</title><title>International journal of strategic information technology and applications</title><description>Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that may be hiding or operating deep within an Oracle database system. Using a deep understanding of Oracle normal operations provides a baseline to assist in discovering APT behavior. Incorporating these into a database intrusion detection system can raise the ability for finding these threats.</description><subject>Analysis</subject><subject>Computer information security</subject><subject>Computer programs</subject><subject>Computer software industry</subject><subject>Computers</subject><subject>Detection</subject><subject>Human resource departments</subject><subject>Intrusion</subject><subject>Methodology</subject><subject>Methods</subject><subject>Organizations</subject><subject>Risk</subject><subject>Security management</subject><subject>Software</subject><subject>Technology application</subject><issn>1947-3095</issn><issn>1947-3109</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><recordid>eNqNkUFr3TAMgMNYYaXrD9gtxw32OimxE-f4aLe20NEeurNxbDnPjzR5s5xB_3090nWHbTAJZBk-yeCvKN4hnAlA9SnsOSRzVgHma07xqjjGTrSbGqF7_auHTr4pTpn3kEOKtmnhuLj-Smk3u3mch8fSz7G8oEQ2hWkot-6HmSy58o4iB040pfJ-F8kkLsNU3kZjRyovTDK9YeK3xZE3I9Pp83lSfPvy-f78anNze3l9vr3Z2KpDtVG9R9M7gU54Yb0lktgrD72TxpFvbG-cRQByFXRt3XfKVaIChUL51sm2Piner3sPcf6-ECf9ENjSOJqJ5oU1Ng0AoqrUf6AVQAtS1hn9uKKDGUn3C4eJOBcOwy7xYBZmvW0bRJRYYcZxxW2cmSN5fYjhwcRHjaB_OtGrE_3bSZ75sM6EIej9vMQpf9OfnD44n9nLv7DPnnT2pF886ezpn4_K-glPtKai</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Ray, Loye L</creator><creator>Felch, Henry</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>8BP</scope><scope>E3H</scope><scope>F2A</scope></search><sort><creationdate>20140101</creationdate><title>Methodology for Detecting Advanced Persistent Threats in Oracle Databases</title><author>Ray, Loye L ; Felch, Henry</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2918-8bf1abd41d4f4cfcee51b8f0bd5adef6cbadc100ed20973b98d24208148f7d573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Analysis</topic><topic>Computer information security</topic><topic>Computer programs</topic><topic>Computer software industry</topic><topic>Computers</topic><topic>Detection</topic><topic>Human resource departments</topic><topic>Intrusion</topic><topic>Methodology</topic><topic>Methods</topic><topic>Organizations</topic><topic>Risk</topic><topic>Security management</topic><topic>Software</topic><topic>Technology application</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ray, Loye L</creatorcontrib><creatorcontrib>Felch, Henry</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Library & Information Sciences Abstracts (LISA) - CILIP Edition</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><jtitle>International journal of strategic information technology and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ray, Loye L</au><au>Felch, Henry</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Methodology for Detecting Advanced Persistent Threats in Oracle Databases</atitle><jtitle>International journal of strategic information technology and applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>5</volume><issue>1</issue><spage>42</spage><epage>53</epage><pages>42-53</pages><issn>1947-3095</issn><eissn>1947-3109</eissn><abstract>Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that may be hiding or operating deep within an Oracle database system. Using a deep understanding of Oracle normal operations provides a baseline to assist in discovering APT behavior. Incorporating these into a database intrusion detection system can raise the ability for finding these threats.</abstract><pub>IGI Global</pub><doi>10.4018/ijsita.2014010104</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1947-3095 |
ispartof | International journal of strategic information technology and applications, 2014-01, Vol.5 (1), p.42-53 |
issn | 1947-3095 1947-3109 |
language | eng |
recordid | cdi_crossref_primary_10_4018_ijsita_2014010104 |
source | Alma/SFX Local Collection |
subjects | Analysis Computer information security Computer programs Computer software industry Computers Detection Human resource departments Intrusion Methodology Methods Organizations Risk Security management Software Technology application |
title | Methodology for Detecting Advanced Persistent Threats in Oracle Databases |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A41%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Methodology%20for%20Detecting%20Advanced%20Persistent%20Threats%20in%20Oracle%20Databases&rft.jtitle=International%20journal%20of%20strategic%20information%20technology%20and%20applications&rft.au=Ray,%20Loye%20L&rft.date=2014-01-01&rft.volume=5&rft.issue=1&rft.spage=42&rft.epage=53&rft.pages=42-53&rft.issn=1947-3095&rft.eissn=1947-3109&rft_id=info:doi/10.4018/ijsita.2014010104&rft_dat=%3Cgale_cross%3EA761115121%3C/gale_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1620070553&rft_id=info:pmid/&rft_galeid=A761115121&rfr_iscdi=true |