System architecture for SQL injection and insider misuse detection system for DBMS

As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Asmawi, Aziah, Sidek, Zailani Mohamed, Razak, Shukor Abd
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume 4
creator Asmawi, Aziah
Sidek, Zailani Mohamed
Razak, Shukor Abd
description As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.
doi_str_mv 10.1109/ITSIM.2008.4631942
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4631942</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4631942</ieee_id><sourcerecordid>4631942</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-637e53b60aea98557abb176e4c1439f223f2794cd87cc865d57035915ec645153</originalsourceid><addsrcrecordid>eNpVkMlOw0AQRAdBJELwD8BlfsBm9uUIYbPkCIF9j8bjtpgIO8jjHPL3OIov9KVVVaondSN0R0lGKbEPeVXmm4wRYjKhOLWCXaDEakMFE4JxZtTlP63tFVoyKmVqrOYLdHOqWsKM0NcoiXFHpuFWWKmX6Ks8xhE67Ab_HUbw42EA3O4HXH4WOPS7yQn7Hru-mVQMDQy4C_EQATcwzmE8I06t56dNeYsWrfuJkMx7harXl2r9nhYfb_n6sUiDJWOquAbJa0UcOGuk1K6uqVYgPBXctozxdrpE-MZo742SjdSES0sleCUklXyF7s_YAADb3yF0bjhu5w_xP7BRVLs</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</creator><creatorcontrib>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</creatorcontrib><description>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</description><identifier>ISSN: 2155-8973</identifier><identifier>ISBN: 9781424423279</identifier><identifier>ISBN: 1424423279</identifier><identifier>EISBN: 9781424423286</identifier><identifier>EISBN: 1424423287</identifier><identifier>DOI: 10.1109/ITSIM.2008.4631942</identifier><identifier>LCCN: 2008902847</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Database systems ; Internet ; Intrusion detection ; Security ; Servers</subject><ispartof>2008 International Symposium on Information Technology, 2008, Vol.4, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4631942$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4631942$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Asmawi, Aziah</creatorcontrib><creatorcontrib>Sidek, Zailani Mohamed</creatorcontrib><creatorcontrib>Razak, Shukor Abd</creatorcontrib><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><title>2008 International Symposium on Information Technology</title><addtitle>ITSIM</addtitle><description>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</description><subject>Computer security</subject><subject>Database systems</subject><subject>Internet</subject><subject>Intrusion detection</subject><subject>Security</subject><subject>Servers</subject><issn>2155-8973</issn><isbn>9781424423279</isbn><isbn>1424423279</isbn><isbn>9781424423286</isbn><isbn>1424423287</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkMlOw0AQRAdBJELwD8BlfsBm9uUIYbPkCIF9j8bjtpgIO8jjHPL3OIov9KVVVaondSN0R0lGKbEPeVXmm4wRYjKhOLWCXaDEakMFE4JxZtTlP63tFVoyKmVqrOYLdHOqWsKM0NcoiXFHpuFWWKmX6Ks8xhE67Ab_HUbw42EA3O4HXH4WOPS7yQn7Hru-mVQMDQy4C_EQATcwzmE8I06t56dNeYsWrfuJkMx7harXl2r9nhYfb_n6sUiDJWOquAbJa0UcOGuk1K6uqVYgPBXctozxdrpE-MZo742SjdSES0sleCUklXyF7s_YAADb3yF0bjhu5w_xP7BRVLs</recordid><startdate>200808</startdate><enddate>200808</enddate><creator>Asmawi, Aziah</creator><creator>Sidek, Zailani Mohamed</creator><creator>Razak, Shukor Abd</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200808</creationdate><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><author>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-637e53b60aea98557abb176e4c1439f223f2794cd87cc865d57035915ec645153</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Computer security</topic><topic>Database systems</topic><topic>Internet</topic><topic>Intrusion detection</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Asmawi, Aziah</creatorcontrib><creatorcontrib>Sidek, Zailani Mohamed</creatorcontrib><creatorcontrib>Razak, Shukor Abd</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Asmawi, Aziah</au><au>Sidek, Zailani Mohamed</au><au>Razak, Shukor Abd</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>System architecture for SQL injection and insider misuse detection system for DBMS</atitle><btitle>2008 International Symposium on Information Technology</btitle><stitle>ITSIM</stitle><date>2008-08</date><risdate>2008</risdate><volume>4</volume><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>2155-8973</issn><isbn>9781424423279</isbn><isbn>1424423279</isbn><eisbn>9781424423286</eisbn><eisbn>1424423287</eisbn><abstract>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</abstract><pub>IEEE</pub><doi>10.1109/ITSIM.2008.4631942</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-8973
ispartof 2008 International Symposium on Information Technology, 2008, Vol.4, p.1-6
issn 2155-8973
language eng
recordid cdi_ieee_primary_4631942
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer security
Database systems
Internet
Intrusion detection
Security
Servers
title System architecture for SQL injection and insider misuse detection system for DBMS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A28%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=System%20architecture%20for%20SQL%20injection%20and%20insider%20misuse%20detection%20system%20for%20DBMS&rft.btitle=2008%20International%20Symposium%20on%20Information%20Technology&rft.au=Asmawi,%20Aziah&rft.date=2008-08&rft.volume=4&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=2155-8973&rft.isbn=9781424423279&rft.isbn_list=1424423279&rft_id=info:doi/10.1109/ITSIM.2008.4631942&rft_dat=%3Cieee_6IE%3E4631942%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424423286&rft.eisbn_list=1424423287&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4631942&rfr_iscdi=true