Learning fingerprints for a database intrusion detection system

被引:0
|
作者
Lee, SY [1 ]
Low, WL [1 ]
Wong, PY [1 ]
机构
[1] DSO Natl Labs, Comp Secur Lab, Singapore, Singapore
来源
COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS | 2002年 / 2502卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There is a growing security concern on the increasing number of databases that are accessible through the Internet. Such databases may contain sensitive information like credit card numbers and personal medical histories. Many e-service providers are reported to be leaking customers' information through their websites. The hackers exploited poorly coded programs that interface with backend databases using SQL injection techniques. We developed an architectural framework, DIDAFIT (Detecting Intrusions in DAtabases through FIngerprinting Transactions) [1], that can efficiently detect illegitimate database accesses. The system works by matching SQL statements against a known set of legitimate database transaction fingerprints. In this paper, we explore the various issues that arise in the collation, representation and summarization of this potentially huge set of legitimate transaction fingerprints. We describe an algorithm that summarizes the raw transactional SQL queries into compact regular expressions. This representation can be used to match against incoming database transactions efficiently. A set of heuristics is used during the summarization process to ensure that the level of false negatives remains low. This algorithm also takes into consideration incomplete logs and heuristically identifies "high risk" transactions.
引用
收藏
页码:264 / 279
页数:16
相关论文
共 50 条
  • [31] Cascaded intrusion detection system using machine learning
    Ahamed, Md. Khabir Uddin
    Karim, Abdul
    SYSTEMS AND SOFT COMPUTING, 2025, 7
  • [32] Application of Deep Learning Technique in an Intrusion Detection System
    Saraeian, Shideh
    Golchi, Mahya Mohammadi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2020, 19 (02)
  • [33] HYBRID MACHINE LEARNING TECHNIQUE FOR INTRUSION DETECTION SYSTEM
    Tahir, Hatim Mohamad
    Hasan, Wael
    Said, Abas Md
    Zakaria, Nur Haryani
    Katuk, Norliza
    Kabir, Nur Farzana
    Omar, Mohd Hasbullah
    Ghazali, Osman
    Yahya, Noor Izzah
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 464 - 472
  • [34] Fast Learning Neural Network Intrusion Detection System
    Koch, Robert
    Dreo, Gabi
    SCALABILITY OF NETWORKS AND SERVICES, PROCEEDINGS, 2009, 5637 : 187 - 190
  • [35] Machine learning approach to realtime intrusion detection system
    Kim, BJ
    Kim, IK
    AI 2005: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2005, 3809 : 153 - 163
  • [36] Hybrid intrusion detection system using machine learning
    Meryem A.
    Ouahidi B.E.
    Network Security, 2020, 2020 (05) : 8 - 19
  • [37] Network Intrusion Detection System using Deep Learning
    Ashiku, Lirim
    Dagli, Cihan
    BIG DATA, IOT, AND AI FOR A SMARTER FUTURE, 2021, 185 : 239 - 247
  • [38] Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling
    Bockermann, Christian
    Apel, Martin
    Meier, Michael
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2009, 5587 : 196 - +
  • [39] Database Intrusion Detection by Transaction Signature
    Rathod, Yagnik A.
    Chaudhari, M. B.
    Jethava, G. B.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [40] Approaches and Challenges in Database Intrusion Detection
    Santos, Ricardo Jorge
    Bernardino, Jorge
    Vieira, Marco
    SIGMOD RECORD, 2014, 43 (03) : 36 - 47