Abstract
The authors describe a method for intrusion detection applied to real time database systems. The novel idea pursued in this study is to exploit the real time properties of data in intrusion detection. Data objects will be tagged with «time semantics» that capture expectations about update rates that are unknown to the intruders. This is not simply timestamping data. Our notion of time signatures can be used to detect violations of the security policy. For testing purposes, we use intruders that disguise themselves as «normal» transactions, and compare the ability of different numerically quantifiable measures to capture the behavior of the expected update and to recognize intrusions. For instance, by using a hidden periodic update rate, the system can detect unauthorized update requests, as they will likely not occur at the right time, thereby triggering an alarm to the system. The experimental results show that this technique could be a powerful discriminating measure to identify intruders with a low false alarm rate. While the results are presented for real time databases, the idea is also applicable to traditional systems.
| Original language | English |
|---|---|
| Article number | 852457 |
| Pages (from-to) | 124-133 |
| Number of pages | 10 |
| Journal | Real-Time Technology and Applications - Proceedings |
| DOIs | |
| State | Published - 2000 |
| Event | 6th IEEE Real-Time Technology and Applications Symposium, RTAS 2000 - Washington, DC, United States Duration: 31 May 2000 → 2 Jun 2000 |
Fingerprint
Dive into the research topics of 'Intrusion detection in real-time database systems via time signatures'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver