Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer: Audit Design Based on Protocol Analysis of ORACLE Database

Title:
Audit Design Based on Protocol Analysis of ORACLE Database
Source:
DEStech Transactions on Computer Science and Engineering; International Conference on Artificial Intelligence and Computer Science (AICS 2016) ; 2475-8841
Publisher Information:
DEStech Publications, Inc.
Publication Year:
2017
Collection:
DPI Journals (Destech Publications)
Document Type:
Fachzeitschrift article in journal/newspaper
Language:
unknown
DOI:
10.12783/dtcse/aics2016/8208
Rights:
Copyright (c) 2017 DEStech Transactions on Computer Science and Engineering
Accession Number:
edsbas.21771C9D
Database:
BASE

Weitere Informationen

As companies rely more and more on information systems, security of database becomes increasingly important. The database has a security mechanism to ensure completeness and correctness, however attackers or unauthorized users always want to operate database through non-formal ways. Therefore, it’s important to record user’s operations worked on the database.This paper puts forward a new way to record user’s actions in the audit system, which accesses to the network through the bypass monitoring method, this way audits database by setting the policy. The advantages are that the audit system does not affect the communication between the client and the database server, and database problem does not affect the database audit system. In this paper, Oracle database communication protocol TNS will be example to describe the audit system. This paper also introduces TNS in the protocol framework and shows its level position, then designs a framework for the audit system according to the network model.