Why Monitoring Database Application Behavior is the Best

Download Report

Transcript Why Monitoring Database Application Behavior is the Best

Clay Brockman
ITK 478
Fall 2007
 Why intrusion detection?
 Comparing two types:
 Monitoring Database Application
Behavior
 Using Time Signatures
 “Security is an integrative concept
that includes the following
properties: confidentiality …,
authenticity …, integrity …, and
availability” (Vieira and Madeira,
2005, p. 350)
 Explanation of these properties
 Occur in one of the following ways:
 “intentional unauthorized attempts to access or destroy
private data” (Vieira and Madeira, 2005, p. 351)
 “malicious actions executed by authorized users to cause
loss or corruption of critical data” (Vieira and Madeira,
2005, p. 351)
 “external interferences aimed to cause undue delays in
accessing or using data, or even denial of service” (Vieira
and Madeira, 2005, p. 351)
 False Positive
 the detection system reports an intrusion but the action
is really a legitimate request (Afonso, et al., 2006, p.37)
 accounts for 17% of recorded events (Afonso, et al., 2006,
p.37)
 False Negative
 system will allow a malicious request to pass,
identifying it as a legitimate request (Afonso, et al.,
2006, p.37)
 accounts for about 12% of recorded events
(Afonso, et al., 2006, p.37)
 Developed by José Fonseca, Marco Vieira, and
Henrique Madeira
 This method “adds concurrent intrusion detection to
DBMS using a comprehensive set of behavior
abstractions representing database activity” (Fonseca,
et al., 2006, p. 383).
 Messages checked at 3 different levels
 Command Level
 Transaction Level
 Session Level
 Command Level
 “checks if the structure of each executed command belongs to
the set of command structures previously learned” (Fonseca,
et al., 2006, p. 383)
 Transaction Level
 “checks if the command is in the right place inside the
transaction profile (a transaction is a unit formed by a set of
SQL commands always executed in the same sequence)”
(Fonseca, et al., 2006, p. 383)
 Session Level
 “checks if the transaction fits in a known transaction
sequence. It represents the sequence of operations that the
user executes in a session” (Fonseca, et al., 2006, p. 383)
 Results:
 1 normal request was found to be malicious,
resulting in 1 false positive
 100% accuracy on requests with slight changes
 Randomly ordered SQL commands resulted in
4.2% false negatives
 All 50 manual injections were caught
 Expects requests to come in at certain
times
 Based on a real-time database
 Examples:
 Stock Market
 Power Grid
 Air Traffic Control
 Two different types of intrusions
 User transactions:
 “the characteristics of an intruding transaction are
identical to a user transaction except for the data object
access pattern” (Lee, et al., 2000, p. 128)
 Sensor transactions:
 Read a sensor periodically to check for updated
information (Lee, et al., 2000, p. 127-128)
 Results:
 False positive rate was as low as 0.36%
(Lee, et al., 2000, p. 129)
 False negative rate was as high as 5.5%
(Lee, et al., 2000, p. 129).
 Both methods had very low false
positive rates
 Monitoring Database Application
behavior was better on false
negative rates by 1.5%