A Practical Implementation Of A Real-time Intrusion Prevention System For Commercial Enterprise Databases
Free (open access)
U. T. Mattsson
Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial market for a number of years now because they are relatively simple to use, understand and maintain. However, they fall prey to a number of shortcomings such as scaling with increased traffic requirements, use of complex and false positive prone signature databases, and their inability to detect novel intrusive attempts. This intrusion detection system interacts with the access control system to deny further access when detection occurs and represent a practical implementation addressing these and other concerns. This paper presents an overview of our work in creating a practical database intrusion detection system. Traditional commercial implementations of database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its integrity and availability. The proposed solution offers the ability to detect misuse and subversion through the direct monitoring of database operations inside the database host, providing an important complement to host-based and networkbased surveillance. Keywords: isolation, intrusion tolerance, database security, encryption, GLBA, HIPAA. 1 Introduction Most companies solely implement perimeter-based security solutions, even though the greatest threats are from internal sources. Additionally, companies
isolation, intrusion tolerance, database security, encryption, GLBA, HIPAA.