Database security research aims to protect a database from unintended activities, such as authenticated misuse, mali-cious attacks. In recent years, surviving DBMS from an at-tack is becoming even more crucial because networks have become more open and the increasingly critical role that database servers are playing nowadays. Unlike the tradi-tional database failure/attack recovery mechanisms, in this paper, we propose a light-weight dynamic Data Damage Tracking, Quarantine, and Recovery (DTQR) solution. We built the DTQR scheme into the kernel of PostgreSQL. We comprehensively study this approach from a few aspects (e.g., system overhead, impact of the intrusion detection sys-tem), and the experimental results demonstrated that our DTQR ca...
This report presents a preliminary assessment of the threats and vulnerabilities encountered in data...
Today, the internet has become a 4th necessity for human after air, water and food. The internet is ...
Abstract. Dynamic content for Web applications is typically managed through database engines, includ...
Data represent today a valuable asset for companies and organizations and must be protected. Most of...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
Data recovery techniques for malicious transactions are increasingly becoming an important issue sin...
Abstract In web context, a self-healing database system which has the ability to automatically locat...
In this paper we propose a new architecture for database intrusion detection. Recently there has bee...
Current database survivability technologies focus on maintaining data integrity and availability in...
The intrusion response component of an overall intrusion detection system is responsible for issuing...
While traditional secure database systems rely on prevention control and are very limited in survivi...
In today’s world, data is generated at a very rapid speed and final destination of such data is the ...
A typical Denial of Service attack against a DBMS may occur through a query flood, that is, a large ...
Databases still be the foremost unremarkably used backend storage in enterprises, however they're us...
Abstract: Ensuring the security of databases is a complex issue for companies. The more complex the ...
This report presents a preliminary assessment of the threats and vulnerabilities encountered in data...
Today, the internet has become a 4th necessity for human after air, water and food. The internet is ...
Abstract. Dynamic content for Web applications is typically managed through database engines, includ...
Data represent today a valuable asset for companies and organizations and must be protected. Most of...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
Data recovery techniques for malicious transactions are increasingly becoming an important issue sin...
Abstract In web context, a self-healing database system which has the ability to automatically locat...
In this paper we propose a new architecture for database intrusion detection. Recently there has bee...
Current database survivability technologies focus on maintaining data integrity and availability in...
The intrusion response component of an overall intrusion detection system is responsible for issuing...
While traditional secure database systems rely on prevention control and are very limited in survivi...
In today’s world, data is generated at a very rapid speed and final destination of such data is the ...
A typical Denial of Service attack against a DBMS may occur through a query flood, that is, a large ...
Databases still be the foremost unremarkably used backend storage in enterprises, however they're us...
Abstract: Ensuring the security of databases is a complex issue for companies. The more complex the ...
This report presents a preliminary assessment of the threats and vulnerabilities encountered in data...
Today, the internet has become a 4th necessity for human after air, water and food. The internet is ...
Abstract. Dynamic content for Web applications is typically managed through database engines, includ...