System architecture for SQL injection and insider misuse detection system for DBMS
As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | 4 |
creator | Asmawi, Aziah Sidek, Zailani Mohamed Razak, Shukor Abd |
description | As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system. |
doi_str_mv | 10.1109/ITSIM.2008.4631942 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4631942</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4631942</ieee_id><sourcerecordid>4631942</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-637e53b60aea98557abb176e4c1439f223f2794cd87cc865d57035915ec645153</originalsourceid><addsrcrecordid>eNpVkMlOw0AQRAdBJELwD8BlfsBm9uUIYbPkCIF9j8bjtpgIO8jjHPL3OIov9KVVVaondSN0R0lGKbEPeVXmm4wRYjKhOLWCXaDEakMFE4JxZtTlP63tFVoyKmVqrOYLdHOqWsKM0NcoiXFHpuFWWKmX6Ks8xhE67Ab_HUbw42EA3O4HXH4WOPS7yQn7Hru-mVQMDQy4C_EQATcwzmE8I06t56dNeYsWrfuJkMx7harXl2r9nhYfb_n6sUiDJWOquAbJa0UcOGuk1K6uqVYgPBXctozxdrpE-MZo742SjdSES0sleCUklXyF7s_YAADb3yF0bjhu5w_xP7BRVLs</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</creator><creatorcontrib>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</creatorcontrib><description>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</description><identifier>ISSN: 2155-8973</identifier><identifier>ISBN: 9781424423279</identifier><identifier>ISBN: 1424423279</identifier><identifier>EISBN: 9781424423286</identifier><identifier>EISBN: 1424423287</identifier><identifier>DOI: 10.1109/ITSIM.2008.4631942</identifier><identifier>LCCN: 2008902847</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Database systems ; Internet ; Intrusion detection ; Security ; Servers</subject><ispartof>2008 International Symposium on Information Technology, 2008, Vol.4, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4631942$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4631942$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Asmawi, Aziah</creatorcontrib><creatorcontrib>Sidek, Zailani Mohamed</creatorcontrib><creatorcontrib>Razak, Shukor Abd</creatorcontrib><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><title>2008 International Symposium on Information Technology</title><addtitle>ITSIM</addtitle><description>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</description><subject>Computer security</subject><subject>Database systems</subject><subject>Internet</subject><subject>Intrusion detection</subject><subject>Security</subject><subject>Servers</subject><issn>2155-8973</issn><isbn>9781424423279</isbn><isbn>1424423279</isbn><isbn>9781424423286</isbn><isbn>1424423287</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkMlOw0AQRAdBJELwD8BlfsBm9uUIYbPkCIF9j8bjtpgIO8jjHPL3OIov9KVVVaondSN0R0lGKbEPeVXmm4wRYjKhOLWCXaDEakMFE4JxZtTlP63tFVoyKmVqrOYLdHOqWsKM0NcoiXFHpuFWWKmX6Ks8xhE67Ab_HUbw42EA3O4HXH4WOPS7yQn7Hru-mVQMDQy4C_EQATcwzmE8I06t56dNeYsWrfuJkMx7harXl2r9nhYfb_n6sUiDJWOquAbJa0UcOGuk1K6uqVYgPBXctozxdrpE-MZo742SjdSES0sleCUklXyF7s_YAADb3yF0bjhu5w_xP7BRVLs</recordid><startdate>200808</startdate><enddate>200808</enddate><creator>Asmawi, Aziah</creator><creator>Sidek, Zailani Mohamed</creator><creator>Razak, Shukor Abd</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200808</creationdate><title>System architecture for SQL injection and insider misuse detection system for DBMS</title><author>Asmawi, Aziah ; Sidek, Zailani Mohamed ; Razak, Shukor Abd</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-637e53b60aea98557abb176e4c1439f223f2794cd87cc865d57035915ec645153</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Computer security</topic><topic>Database systems</topic><topic>Internet</topic><topic>Intrusion detection</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Asmawi, Aziah</creatorcontrib><creatorcontrib>Sidek, Zailani Mohamed</creatorcontrib><creatorcontrib>Razak, Shukor Abd</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Asmawi, Aziah</au><au>Sidek, Zailani Mohamed</au><au>Razak, Shukor Abd</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>System architecture for SQL injection and insider misuse detection system for DBMS</atitle><btitle>2008 International Symposium on Information Technology</btitle><stitle>ITSIM</stitle><date>2008-08</date><risdate>2008</risdate><volume>4</volume><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>2155-8973</issn><isbn>9781424423279</isbn><isbn>1424423279</isbn><eisbn>9781424423286</eisbn><eisbn>1424423287</eisbn><abstract>As organizations increase their adoption of database systems as one of their key data management technologies for the daily operations and decision makings, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have effect the entire organization. The recent rapid proliferations of web-based applications with database at its backend have further increased the risk of database exposure to the outside world. There are many recent reports on intrusion from external hackers which compromised the database system. However, there are also insiders who abuse their privileges and access the database system for many intentions. For that reason, it is imperative for us to secure database system from both external and internal attacks. This paper describes on database security threats and the existing works that had been done to mitigate these problems. One of possible solutions is by using Intrusion Detection System (IDS). For that reason, this study proposed a novel SQL Injections and Insider Misuse Detection System (SIIMDS) to provide higher level of security for database system.</abstract><pub>IEEE</pub><doi>10.1109/ITSIM.2008.4631942</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-8973 |
ispartof | 2008 International Symposium on Information Technology, 2008, Vol.4, p.1-6 |
issn | 2155-8973 |
language | eng |
recordid | cdi_ieee_primary_4631942 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer security Database systems Internet Intrusion detection Security Servers |
title | System architecture for SQL injection and insider misuse detection system for DBMS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A28%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=System%20architecture%20for%20SQL%20injection%20and%20insider%20misuse%20detection%20system%20for%20DBMS&rft.btitle=2008%20International%20Symposium%20on%20Information%20Technology&rft.au=Asmawi,%20Aziah&rft.date=2008-08&rft.volume=4&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=2155-8973&rft.isbn=9781424423279&rft.isbn_list=1424423279&rft_id=info:doi/10.1109/ITSIM.2008.4631942&rft_dat=%3Cieee_6IE%3E4631942%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424423286&rft.eisbn_list=1424423287&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4631942&rfr_iscdi=true |