Proceedings of the 16th International Conference on Extending Database Technology 2013
DOI: 10.1145/2452376.2452469
|View full text |Cite
|
Sign up to set email alerts
|

PostgreSQL anomalous query detector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Since the safety of the RSA public key cryptography is already proven, a possible attack is to threaten PostgreSQL within the data processing node. The attack can be prevented by applying the solutions (e.g., PostgreSQL anomaly detector [31] and homogeneous encryption implementation for Relational DBMSs such as PostgreSQL [32]) that are DB security solutions to compensate for the security vulnerabilities of PostgreSQL DB. PostgreSQL also provides its own security solutions, such as access control lists (ACLs) [33] and encryption [34], which can be used to improve the key management security of our system.…”
Section: Secruity Analysismentioning
confidence: 99%
“…Since the safety of the RSA public key cryptography is already proven, a possible attack is to threaten PostgreSQL within the data processing node. The attack can be prevented by applying the solutions (e.g., PostgreSQL anomaly detector [31] and homogeneous encryption implementation for Relational DBMSs such as PostgreSQL [32]) that are DB security solutions to compensate for the security vulnerabilities of PostgreSQL DB. PostgreSQL also provides its own security solutions, such as access control lists (ACLs) [33] and encryption [34], which can be used to improve the key management security of our system.…”
Section: Secruity Analysismentioning
confidence: 99%
“…This attack can temporarily impair the availability of the DBMS during the recovery period. We rely on the existence of an IDS to detect the malicious transactions [7]. Note that the IDS alarm is received after the malicious transactions commit.…”
Section: Threat Modelmentioning
confidence: 99%
“…In this paper, we propose a new real-time response and recovery architecture, termed Partition-based Intrusion Management System (PIMS), for DBMSs. We assume that existing IDS, e.g., [4], [7], can be integrated with PIMS. PIMS is based on an adaptive access and admission control mechanism that responds to intrusions by selectively blocking segments of data that have been affected by the intrusion.…”
Section: Introductionmentioning
confidence: 99%
“…Syntax centric AD relies on the SQL query syntax to construct user profiles. Previous work by Kamra, Bertino et al proposed a role and user‐based syntax centric AD approach . Even though the methods proposed are computationally fast as they only need to parse the query in order to perform AD, some attributes of the query cannot be captured by relying upon the query syntax only, such as the size of the query result set and the characteristics of the portions of accessed tables that will show in the result.…”
Section: Related Workmentioning
confidence: 99%