0% found this document useful (0 votes)
1 views

Database Intrusion Detection Using Role Based Access Control System

This paper presents a novel approach to database intrusion detection using a Role Based Access Control (RBAC) system, which dynamically identifies sensitive attributes and restricts access based on user roles. The authors argue that traditional methods of intrusion detection are inadequate and propose a refined model that simplifies rules while enhancing security. The implementation of RBAC is outlined through a structured process that includes planning, defining roles, and integrating security measures to protect sensitive data effectively.

Uploaded by

Nguyễn Thành
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Database Intrusion Detection Using Role Based Access Control System

This paper presents a novel approach to database intrusion detection using a Role Based Access Control (RBAC) system, which dynamically identifies sensitive attributes and restricts access based on user roles. The authors argue that traditional methods of intrusion detection are inadequate and propose a refined model that simplifies rules while enhancing security. The implementation of RBAC is outlined through a structured process that includes planning, defining roles, and integrating security measures to protect sensitive data effectively.

Uploaded by

Nguyễn Thành
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

www. ijraset.

com Special Issue-1, October 2014


SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
Database Intrusion Detection Using Role Based
Access Control System
Mrs. Antony Vigil1, Mrinalini Shridhar2, R Oviya3
1, 2, 3
Assistant Professor, Student SRM University

Abstract- In this paper, we propose a different approach for the database intrusion detection (IDS). Database Management
(DBMS) has become a key criteria in the information system (IS) storing valuable information of the system. We are urged to
protect it to the fullest without losing any bit of information. Intrusion detection, which gathers and analyses the information
system was one of the methods which protects the database the fullest with all sorts of rules. In this paper, we move into the Role
based Access Control (RBAC) system which controls the administered databases for finding out sensitive attributes of the system
dynamically. Role based Access Control is a method to restrict system access by authorized and unauthorized people directly. The
access is based on the roles of the individual users within the organization. Important roles like administrator, access sensitive
attributes and if their audit logs are mined, then some useful information regarding the attributes can be used. This will help to
decide the sensitivity of the attributes. Since the models of the database intrusion detection has proposed a lot of rules , it is time
to change the system to protect it more evidently with less rules and regulations which would be useful for detecting all sorts of
transactions.
Keywords: Database intrusion detection, Role based access control system, Administered database, Audit logs, Sensitive and
attributes.

I. INTRODUCTION us to protect the database along with the intrusion detection


with limited rules.
In past years, Database Management System (DBMS) have RBAC- Role based access control, also known as role
become an indispensible part of the life of the organizers and the based security is a method to restrict access of just one user, and
users using it. Hence it was the primary priority to safeguard the also many users depending on the role of the users. The roles are
DBMS, no matter how easy or difficult it was. The motive of the prioritized like Example: Administrators access sensitive
researches was first based on these ideas of protecting the attributes and the DBMS and its attributes can be used. RBAC
DBMS and to prevent the leakage of data. The past years, is a rich technology for authentication privileges and controlling
Authentication user privileges , Auditing, Encryption and lots the access of the information and data. It makes the
of methods have been used to protect the data and the system. administration of the security (work) much easier and simpler,
Amending all the above methods, newer methods have come up though the process may be tedious and little vast. The possibility
to protect the same for daily operations and decision making in of adding newer application inside the secured system is much
organizations. Database is a group or collection of data's which easier with the different access control mechanism. Extracting
may contain valuable and sensitive information about the the data from the protected information system is much easier
institution and organization, which is accessed by the people of only by an authorized person. Talking about the sensitivity of
the organization internally and externally every day. the attributes we will have to refine the audit log to extract the
Any leak of information in these systems will devastate the data attributes.
whole database system and the data's, leading to a great loss. In the past few years computer crime and security
Hence the data need to be protected and secured. The recent survey conducted by the Computer Security Institute(CSI) have
models of protection of DBMS were the dynamic threshold seen a lot of drastic improvement in both the aspects ,but only
method and the data mining method of Intrusion detection thing was that there need to be a lot of adjustments in the rules
system. Intrusion detection method is a process which analyses given by each model. We are in the scoop of improving the
the unauthorized access and malicious behaviors and finds database system and protecting it. In 2005, about 45% of the
intrusion behaviors and attempts by detecting the state and inquired entities have reported increased unauthorized access to
activity of an operating system to provide an effective means for information due to the poor system management. In 2007,
intrusion defend. In this paper, we will see how RBAC will help financial application fraud was the leading cause and found it

Page 72
www. ijraset.com Special Issue-1, October 2014
SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
double as compared to the previous year also 59% of the
respondents outlined insider abuse as the security problem. In
2013, survey the number has dropped down and the security was
much more than the past few years. The statistics being, the USERS TASK /JOB ACCESS
percentage threats due to insiders has been dropped to 20% and
the financial fraud which was a cause before were eliminated in
the upcoming years. Now only 10-20% are reported as
unauthorized users. This shows that the database security has
been improving day to day and researches have been conducted
every time a model is proposed before implementing to action.

II. ROLE BASED ACCESS CONTROL MODEL CONSTRAINTS


SESSIONS
The Role based access control model proposes 3 relationships
between the attributes given. They are:
FIG 1. MODEL OF RBAC
a) USER-JOB: Which defines the relationship between the user
and the task defined in that system. III. RELATED WORKS

b) JOB-ACCESS: Which defines the relationship between the RBAC supports three well known principles and hence we work
job or the task of the person and the access to that particular out our plan in 3 steps:
work. 1. Principle of minimal authority
2. Divide and rule method of duties
c) JOB-JOB: Which defines the job to job relationship between 3. Data abstraction
the users.
User
Now defining each attribute of the model we have the users of
an organization represents an organizer or an agent of that field.
The task or the job represents the responsibility or the Data secured
functioning of the user within the organization. The access Principle of minimal authority
represents the approval or a permission to that particular task or
event of that organization. The sessions box represents the
overall relationship between the user and the task the Authorization access
contribution both has in the RBAC model. It does not point
towards the access field as the access field is directed only by
Divide and rule method
the task the user performs. Constraints represent the limitations
or the boundary of each entity of that data that is, the user, task
or job, access as well as the relationship between them is also
restricted. The sessions represent the Divide and rule
mechanism of the RBAC model. The fig 2 and 1 are interlinked
process and each step of the data flow diagram will implement Data abstraction
the following attributes of the user.

Data

FIG 2. DATA FLOW DIAGRAM

Page 73
www. ijraset.com Special Issue-1, October 2014
SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
The sensitivity of an attribute is based on the database the contribution to the system. To maintain the account and the
application. We have to divide the attributes into 3 divisions so staff system we need a main administrator. Hence the RBAC
as to protect the attributes according to the sensitivity or the system proposed in this E-R model .Thus E-R model is modified
position order they hold. Sensitivity refers to the position order a as:
data has to be protected. If the data are least sensitive we can
give it minimal protection. If the data are highly sensitive in the STAFF + ACCOUNT + SALARY TYPE =
attribute set we need to protect it to the fullest. In some ACCOUNTS ADMINISTRATOR
schematics we are not able to tell whether the data is sensitive or
not. To give a clear picture of the attributes we have taken the
Student Database Schema.
NAME* STAFF ID* ADDRESS*
TABLE 1.TEACHER'S SALARY DATABASE SCHEMA

TABLE NAME ATTRIBUTE NAME

STAFF
Name [i], Staff-id [j], Address
GETS ACCOUNTS
STAFF [d], Phone no [a]
Administrator
Account-id [b], Staff-id [c],
ACCOUNT Status [g], Month [e], Year [f],
Amount [h] ACCOUNT
Salary-type [k], LOP and
SALARY TYPE Deductions [l]

TABLE 2. TYPES OF SENSITIVE ATTRIBUTES

SENSITIVITY ATTRIBUTE WEIGHTS ACC ID* AMT DEPOSIT*** STATUS**


FIG 3.RBAC MODEL USING E-R MODEL
Light a, b, c, d, i, ,j ,k I
sensitivity
a) Principal of minimal authority- Also known as the principle
Medium e, f II of least privilege means that the access to the information
sensitivity system or its resources for only its own legitimate purpose by
every user or the module. In simple words, we can say that an
High sensitivity g, h, l III authorized user can access that information system or the
resource only for their own privileged purpose. Privileged/
Authority refers to the right a user has or granting access to the
user to use a particular system. For example, the user defined in
The sensitivity of the attributes can also be given by the entity- its domain can access only its domain and its attributes. The
relationship model [E-R]. But with relation to the RBAC model person accessing a bank account can go through only their bank
, an administrator is required to control the database for its procedures and account. The system does not access or grant
sensitivity. It is a perception of the real world. It is the permission to access other accounts. Similarly an admin user
diagrammatic representation of how the attributes are accessing a computer can go into only the admin user account
considered. The * represents if the attributes are sensitive or all other password accounts are blocked for the admin user.
not. The model represents a collection of entities or data's and b)Divide and rule method of duties- it can also be termed as the
separation of duties among the users. It helps the task to be

Page 74
www. ijraset.com Special Issue-1, October 2014
SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
completed faster. A mutual exclusive role is achieved to FIG 4.PROCESS
complete a particular set of task. RBAC brings this advantage of a)Develop Plans- To make best use of RBAC we can develop
time management. the database is secured as well as the data are and plan for the RBAC system into best work in an organization
given to the authorized people easily with security. or for a project's security of data. Example to extract the
c)Data abstraction- Data abstraction is a simple concept of maximum security from RBAC a development plan including a
accessing the data whenever we want to but with the permission project, etc. should be developed along with the deadline ,
of authorized people. It has different modes to it. budget etc.
i)Public Mode- The access to the data by any user of
the domain, but limited to a particular organization. This b)Compile- This step involves the collection and putting
requires a common security where only the users of the together of all data , files , projects, etc. so as to identify the
organization can access it. level of security needed to implement it. Sensitivity of the
ii)Private Mode- The access of the data is limited only attributes should be determined so as to segregate and compile
to the key user of that particular search of interest. That is only the system to one to provide the highest security possible.
the accountants can handle the accounts of the organization and
hence access to that particular class is given only to that c)Define Roles- As we have discussed that operation of database
particular user. A manager accessing the accounts of the system is first best used only by the key user or the important
company will be denied from accessing it. user of that organizer or a system. Hence assigning a particular
iii)Protected Mode- The user in that particular domain role to that person for the easy access of the software to access
and the senior user that is one or maximum two users who has to the data with ease and implement any kind of proper change
write to access that domain can access it with ease. Example within the system.
only the accountants and the chief of the company can check the
accounts of hat particular institution and make changes in that. d)Analyze- this is a main step for any kind of system to know
The others have no right to access these without their and to formulate RBAC. This would bring about the betterment
permission. For the others the domain remains in blocked state. of the system so that the next stage of implementation would be
easier to execute. Any changes needed in the system should be
IV. IMPLEMENTATION done in this stage so that no further disputes arise at the later
stage.
RBAC is a complex system that involves a strategic process
prepared by an expertise. RBAC is best implemented by e)Integrate- Before any problem occurs in the system like
applying a structured and detailed procedure. The use of divide system failure, we need to transfer each application's security
and rule method is very essential to implement these process. system to a centralized security system so as to provide a
Each task or step is broken down into sub tasks for the work and secured companywide information access. this would be the last
implementation to be easier and more efficient. The steps step of the process and would be the final stage without making
involved are: any changes.

DEVELOP PLANS e)Implement- To put forth whatever we have executed these


many steps without any errors or any types of problems. These
are the best ways to protect a data from the external user.
COMPILE
Thus refining the system and protecting it according to
the steps followed would give a better result. Always the
principle of divide and rule method is followed in RBAC which
is the key principle of the system.
DEFINE ROLES
V. PROCESS USING A FORMULAE

ANALYSE Each datum is a process streamline flow of information which is


guarded by security. These syntaxes along with the formula help

INTERGRATE

IMPLEMENT

Page 75
www. ijraset.com Special Issue-1, October 2014
SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
in the security purpose. This formula was implemented in the To calculate the sensitivity or to know the sensitivity of the
Web Based technology, now it is time to implement it in attributes, automatic capitalization would be invoked to
Database to ensure its safety. represent the highest sensitive attributes in the given set of data
or the formula generated at the end of the process typed. The
P1=>| (staff)P| name(P).X | staff id(P).X | phone(P).X least sensitive are given in small letters. The medium sensitive
P2=>| (account)P | account id(P).X | amount might be in italic letters. The ones inside brackets represents that
deposited(P).X | status(P) .Y it is a secured data and hence it is the start of the process and
P=>| P1||P2 that the data must be protected fully. Hence we cannot find the
sensitivity of the attribute at the mid stage of the process. The
Syntax: same process with a change to denote the sensitivity is
represented as :
P=>0 no process
|P|P composition of the process P=>| {(staff)P | name(P).X | staff id(P).X |
| O(P).X output value of the process, X is the phone(P).X} || {(account)P | account id(P).X |
outcome. AMOUNT DEPOSITED(P).X | STATUS(P).Y}
| I(P).Y input value/ getting input from the
user of the process, Y is the input variable.
The other way is:
| !!I(P).Y repetition of the input variables.

P=> run the process P1=>| (staff)P| name(P).X | staff id(P).X | phone(P).X
| D(P) main data or the attributes P2=>| (account)P | account id(P).X | AMOUNT
| read(P) read the data or the attributes DEPOSITED(P).X|STATUS(P).Y
| change(P) change the data or the attributes P=>| P1||P2
P=>enable(R).D gives permission to R to
Thus this formula would be easy for the generation of large sets
access a data
of data and to secure the data and hence even if there is a small
P=>disable(R)>D gives permission to R to
change in the capitalization or the attributes or the brackets or
disable the data or remove or stop the process till R.
any syntax mistake there would be an error generated in the
system which would spoil the whole set of data. This is done for
For the above E-R diagram of the process ,the interaction just a small set of data. We can proceed this for a huge one. An
between the staff salary and the account we can create a formula outsider seeing this would not understand the type of data or the
based on the process. importance of the data and hence would hesitate to meddle with
it.
P=>| {(staff)P | name(P).X | staff id(P).X | VI. CONCLUSION
phone(P).X} || {(account)P | account id(P).X | Intrusion detection mechanism helps to secure the data in an
amount deposited(P).X | status(P).Y} organization. In this paper we have discussed in detail how the
database could be secured by using Role Based Access Control
System. The key benefits of RBAC are high efficiency and low
The other way of representing it is to split the process: maintenance cost for any type of organization be it big or small.
Also RBAC system could be designed and used to improve the
Where staff and the account have no sensitivity and hence it's operational performance and strategic business value. This
just an attribute of the system, where as the other attribute- system could streamline and automate any business procedures,
name, staff id, phone, account, account id, amount deposited are thus providing high/ better/ faster benefits to the user. It also
the inputs and the output is the status. helps to maintain privacy and confidentially of the employees in
The two processes can be divided and then later combined to any organization. Thus we can conclude that mission to protect
form a single equation. If the process needs to be changed or any key business process is a main vision of RBAC system in
read or any other kind of operations, they can be done by the database intrusion detection.
given formula which would be useful for the later run.

Page 76
www. ijraset.com Special Issue-1, October 2014
SJ Impact Factor-3.995 ISSN: 2321-9653

International Journal for Research in Applied Science & Engineering


Technology(IJRASET)
REFERENCES

[1] Intrusion detection database system with dynamic threshold


value By Khomlal sinha and Tripti Sharma
[2] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and A.K.
Majumdar2
[3] J. Han, M. Kamber, Data Mining: Concepts and
Techniques, Morgan Kaufmann Publishers (2001).
[4] U. Fayyad, G. P. Shapiro, P. Smyth, The KDD Process for
Extracting Useful Knowledge from Volumes of Data,
Communications of the ACM, pp. 27-34 (1996).
[5] R. Bace, P. Mell, Intrusion Detection System, NIST Special
Publication on Intrusion Detection System (2001).
[6] A. Srivastava, S. Sural, A.K. Majumdar, Weighted
Intratransactional Rule Mining for Database Intrusion
Detection, Lecture Notes in Artificial Intelligence, Springer
Verlag, Proceedings of Pacific-Asia Conference in Knowledge
Discovery and Data Mining, pp. 611-620 (2006).
[7] W. Lee, S.J. Stolfo, Data Mining Approaches for Intrusion
Detection, Proceedings of the USENIX Security Symposium,
pp. 79-94 (1998).
[8] D. Barbara, J. Couto, S. Jajodia, N. Wu, ADAM: A Testbed
for Exploring the Use of Data Mining in Intrusion Detection,
ACM SIGMOD, pp. 15-24 (2001).
[7] C. Y. Chung, M. Gertz, K. Levitt, DEMIDS: A Misuse
Detection System for Database Systems, IFIP TC-11 WG 11.5
Working Conference on Integrity and Internal Control in
Information System, pp. 159-178 (1999).
[8] V.C.S. Lee, J.A. Stankovic, S.H. Son, Intrusion Detection in
Real-time Database Systems Via Time Signatures, Real Time
Technology and Application Symposium, pp. 124 (2000).
[9] Intrusion detection database system with dynamic threshold
value By Khomlal sinha and Tripti Sharma
[10] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and A.K.
Majumdar2
[11] S.Y. Lee, W.L. Low, P.Y. Wong, Learning Fingerprints for
a Database Intrusion Detection System, Proceedings of the
European Symposium on Research in Computer Security,
pp. 264-280 (2002).

Page 77

You might also like