Factors Hindering Database Security

Topics: Host-based intrusion detection system, Intrusion detection system, Network intrusion detection system Pages: 13 (3306 words) Published: August 14, 2010
Research Proposal Intrusion Detection in Distributed Multimedia Applications Regina Awor Komakec (s0535273) March 31, 2007

1

Contents
1 Introduction 2 Background 2.1 Approaches to Intrusion Detection . . . . . . . . . . . . . . . 2.2 General Model of Intrusion Detection System (IDS) . . . . . 2.3 Types of Intrusion Detection Systems . . . . . . . . . . . . . 2.3.1 Network Layer Intrusion Detection . . . . . . . . . . . 2.3.2 Application Layer Intrusion Detection . . . . . . . . . 2.4 Network Layer and/or Application Layer Intrusion Detection 1 2 2 3 3 4 4 4 5 5 5 6 6 6 7 7 9 9 9

. . . . . .

. . . . . .

3 Research Question 3.1 Sub-Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Relevance of Research 5 Research Methods 5.1 Proposed Case Study: Distributed Multimedia Applications . . . 5.1.1 Teleconferencing . . . . . . . . . . . . . . . . . . . . . . . 5.1.2 Intrusion Detection and Teleconferencing . . . . . . . . . 6 Work Plan Appendices A Intrusion Detection (ID) Models A.1 Denning’s (1986) Intrusion Detection IDES Model . . . . . . . .

B Ideas for Applications To Study 10 B.1 Information Management . . . . . . . . . . . . . . . . . . . . . . 10 B.2 Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 B.3 Identity Management . . . . . . . . . . . . . . . . . . . . . . . . . 10

1

Introduction

The current trend is that it is becoming increasingly easier to attack computer systems. More people with limited computer knowledge (script kiddies) can carry out attack on poorly maintained systems, because attack tools are increasingly accessible and usable. A manifestation of this is the movement of attack tools from command-line to graphical-based tools. The Iris Network Traffic Analyzer (formally known as SpyNet) [5], for example, is a GUI (Graphical User Interface), packet sniffing tool. Information system security is important in this computer age. It goes without saying that information management is crucial for the survival of any firm. Security breaches can have damaging consequences particularly for e-business,

1

which is simply Internet-aided business. Enterprises, for example, depend on information to run their businesses, which is constantly increasing. Hence, there is need to ensure its security, vis-`-vis confidentiality, integrity, and availability, a to maintain a competitive edge over other businesses. Many assume that by securing entry into the network, they can secure their systems. It is not sufficient to focus only on security within networks. Other aspects of the whole system also have to be taken into consideration; for instance, operating system and application security, such as, software and database security. It is important to note that the main threat to information systems comes from people. These threats do not only originate from outsiders, but also from insiders who misuse their privileges. Intrusion detection systems (IDS) are therefore necessary to cope with the increasing threats, both from inside and outside, which are becoming even more difficult to predict. The basic idea of intrusion detection systems is that there is a clear distinction between the behaviour of an intruder and that of a legitimate user. The focus of research will therefore be the investigation of intrusion detection within distributed multimedia systems.

2

Background

Intrusion detection refers to the ability to detect and respond to inappropriate activity [6], [8]. Inappropriate activity, in this case, may include unauthorised or malicious use and abuse of computing and network resources. It is almost impossible to build a computer system free of vulnerabilities.

2.1

Approaches to Intrusion Detection

The primary categorisation of intrusion detection is as anomaly detection and pattern-matching detection [1]. Anomaly detection, sometimes called Statistical anomaly detection, searches for abnormalities. Activities are observed and if they...

References: [1] S. Axelsson. Intrusion detection: A survey and taxonomy. PDF document, 2000. http://www.cs.plu.edu/courses/CompSec/arts/taxonomy.pdf.
8
vacy, page 0120, 1999
Several intrusion detection models have been suggested. Denning’s (1986) IDES model forms the basis for several intrusion detection systems. Other approaches involve the use of agents for intrusion detection (Asaka, et al., 1999).
A.1
Denning’s (1986) Intrusion Detection IDES Model
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Database Security Essay
  • Security Issues in NoSQL Databases Essay
  • Database Security Essay
  • Security Essay
  • It Security Essay
  • Essay about security
  • Essay about database secutiry
  • Essay on Database concepts

Become a StudyMode Member

Sign Up - It's Free