Methodology for Detecting Advanced Persistent Threats in Oracle Databases
Loye L. Ray and
Henry Felch
Additional contact information
Loye L. Ray: Undergraduate School, University of Maryland University College, Adelphi, MD, USA
Henry Felch: University of Maine at Augusta, Augusta, ME, USA
International Journal of Strategic Information Technology and Applications (IJSITA), 2014, vol. 5, issue 1, 42-53
Abstract:
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that may be hiding or operating deep within an Oracle database system. Using a deep understanding of Oracle normal operations provides a baseline to assist in discovering APT behavior. Incorporating these into a database intrusion detection system can raise the ability for finding these threats.
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 18/ijsita.2014010104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jsita0:v:5:y:2014:i:1:p:42-53
Access Statistics for this article
International Journal of Strategic Information Technology and Applications (IJSITA) is currently edited by Mehdi Khosrow-Pour
More articles in International Journal of Strategic Information Technology and Applications (IJSITA) from IGI Global
Bibliographic data for series maintained by Journal Editor ().