Intrusion Detection in Real-Time Database Systems via Time Signatures

  • Authors:
  • Victor C. S. Lee;John A. Stankovic;Sang H. Son

  • Affiliations:
  • -;-;-

  • Venue:
  • RTAS '00 Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000)
  • Year:
  • 2000

Quantified Score

Hi-index 0.01

Visualization

Abstract

In this paper, we describe a method for intrusion detection applied to real-time database systems. The novel idea pursued in this study is to exploit the real-time properties of data in intrusion detection. Data objects will be tagged with 驴time semantics驴 that capture expectations about update rates that are unknown to the intruders. This is not simply time stamping data. Our notion of time signatures can be used to detect violations of the security policy. For testing purposes, we use intruders that disguise themselves as 驴normal驴 transactions, and compare the ability of different numerically quantifiable measures to capture the behavior of the expected update and to recognize intrusions. For instance, by using a hidden periodic update rate, the system can detect unauthorized update requests, as they will likely not occur at the right time, thereby triggering an alarm to the system. The experimental results show that this technique could be a powerful discriminating measure to identify intruders with a low false alarm rate. While the results are presented for real-time databases, the idea is also applicable to traditional systems.