DBMS Application Layer Intrusion Detection for Data Warehouses



Data Warehouses (DWs) are used for producing business knowledge and aiding decision support. Since they store the secrets of the business, securing their data is critical. To accomplish this, several Database Intrusion Detection Systems (DIDS) have been proposed. However, when using DIDS in DWs, most solutions either produce too many false positives (i.e. false alarms) that must be verified or too many false negatives (i.e. true intrusions that pass undetected). Moreover, many approaches detect intrusions a posteriori which, given the sensitivity of DW data, may result in irreparable cost. To the best of our knowledge, no DIDS specifically tailored for DWs has been proposed. This pa-per examines intrusion detection from a data warehousing perspective and the reasons why traditional database security methods are not sufficient to avoid in-trusions. We define the specific requirements for a DW DIDS and propose a conceptual approach for a real-time DIDS for DWs at the SQL command level that works transparently as an extension of the DataBase Management System (DBMS) between the user applications and the database server itself. A prelim-inary experimental evaluation using the TPC-H decision support benchmark is included to demonstrate the DIDS’ efficiency.


Database intrusion detection systems, Database security, Anomaly detection, Misuse detection, Data warehousing


Intrusion Detection in Data Warehouses


ISD 2012 - Information Systems Development, August 2012

Cited by

No citations found