Method for intrusion detection in a database system

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S187000, C713S193000

Reexamination Certificate

active

11510185

ABSTRACT:
A method for detecting intrusion in a database, managed by an access control system, includes defining at least one intrusion detection profile and associating each user with one of said profiles. Each profile includes at least one item access rate. Further, the method determines whether a result of a query exceeds any one of the item access rates defined in the profile associated with the user. In such a case, the access control system is notified to alter the user authorization, thereby making the received request an unauthorized request, before the result is transmitted to the user. Such a method allows for a real time prevention of intrusion by letting the intrusion detection process interact directly with the access control system, and change the user authority dynamically as a result of the detected intrusion.

REFERENCES:
patent: 5278901 (1994-01-01), Shieh et al.
patent: 6405318 (2002-06-01), Rowland
patent: 2002/0023227 (2002-02-01), Sheymov et al.
patent: 0 999 490 (2000-05-01), None
patent: 1 315 065 (2003-05-01), None
patent: 2005189996 (2005-07-01), None
patent: WO-03/044638 (2003-05-01), None
Suresh N. Chari, Pau-Chen Cheng; “BlueBoX: A policy-driven, host-based intrusion detection system”; May 2003, ACM Transactions on Information and System Security (TISSEC), vol. 6, Issue 2, pp. 173-200.
Dorothy E. Denning, “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, vol. SE-13, No. 2 (Los Alamitos, CA, Feb. 1987), pp. 222-232.
R. K. Bhattacharyya, “Security of Network element Databases Against Increasing Threats of Intrusion via Operations Interfaces”, Proceedings: The Institute of Electrical and Electronics Engineers, 1988 International Carnahan Conferernce on Security Technology: Crime Countermeasures (Lexington, KY, Oct. 5-7, 1988), pp. 51-64.
Steven R. Snapp et al., “A System for Distributed Intrusion Detection”, IEEE 1991, pp. 170-176.
International Search Report dated Feb. 24, 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for intrusion detection in a database system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for intrusion detection in a database system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for intrusion detection in a database system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3868554

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.