Real-time data attack isolation for commercial database applications

  • Authors:
  • Peng Liu;Hai Wang;Lunquan Li

  • Affiliations:
  • School of Information Sciences and Technology, Pennsylvania State University, PA;School of Information Sciences and Technology, Pennsylvania State University, PA;School of Information Sciences and Technology, Pennsylvania State University, PA

  • Venue:
  • Journal of Network and Computer Applications
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its integrity and availability. This paper presents the design of a real-time data attack isolation system, denoted DAIS. DAIS isolates likely suspicious actions before a definite determination of intrusion is reported. In this way, the database can be immunized from many malicious transactions. DAIS is a COTS-DBMS-specific implementation of a general isolation algorithm that we developed [Liu P, Jajodia S, McCollum CD. Intrusion confinement by isolation in information systems. Journal of Computer Security, 2000;8(4):243-79]. In this paper, the design of the first DAIS prototype, which is for Oracle Server 9.2, is discussed. DAIS uses triggers and transaction profiles to keep track of the items read and written by transactions, isolates attacks by rewriting user SQL statements, and is transparent to end users. The DAIS design is very general. In addition to Oracle, it can be easily adapted to support many other database application platforms such as Microsoft SQL Server, Sybase, and Informix.