Results 1 to 8 of 8

Thread: Database Inference

  1. #1
    Join Date
    Nov 2008
    Posts
    1

    Database Inference

    I'm currently a member of a research team within a large university setting that was presented with the goal of determining the role of database inference in IT. This includes developing a concise definition of database inference, as well as determining its applicability both as an attack vector and as a mechanism for predictive database analytics. In doing this, our goal is primarily to develop course sections on the topic for integration into some of our DBA and IT courses. It would be a great help if some industry professionals could give me their take on database inference, such as a suitable definition, and if/how it differs from other attacks, mainly SQL injection. This, as well as any other comments or experience you have on the topic, would make it much easier for us to figure out what aspects of inference to focus on.

    Thanks in advance.

  2. #2
    Join Date
    Sep 2002
    Location
    Fantasy
    Posts
    4,254
    Database Inference could happen when there is un-authorized access or an authorized person misusing the authority.

    Un-authorized access could be passive or active and the intention of gaining access is to attack.

    Mis-use of authority could be intentionally or un-intentionally. Authorized person should have the right code of conduct.

    As far as definition as the definition is concerned... try this
    http://phoenix.goucher.edu/~kelliher...s325/nov08.pdf

  3. #3
    Join Date
    Jan 2009
    Posts
    2

    Methods to deter Inference

    So here's my question...what techniques to folks use currently to deter inference? Polyinstantiation is what I'm finding in documentation, but I'm curious to hear from actual DBA's working with this.

    Thanks!

  4. #4
    Join Date
    Nov 2002
    Location
    New Jersey, USA
    Posts
    3,932
    I have been a DBA for 10 years and I don't know what is polyinstantiation.

    But we do use auditing features of database to record any unauthorized access attempt. Also depending on sensitivity of data, any changes in data can be audited.

    A lot of effort is undertaken to lock down the systems as far as possible, with least possible privilege granted to authorized users and securing database with strong passwords, removing default accounts/passwords, applying security patches, etc.

  5. #5
    Join Date
    Sep 2002
    Location
    Fantasy
    Posts
    4,254
    Also. there should be balance. If you audit too many information then it cost lot of resources and archiving and what not.

    If audit too less then SOX or E&Y will be after you.

  6. #6
    Join Date
    Jan 2009
    Posts
    2

    Polyinstantiation

    Polyinstantiation is used in MLS (multi level security) databases...for example when you have data stored at different security levels (confidential, secret, top secret, etc.). Does anyone on here have experience working with such database systems?

  7. #7
    Join Date
    Nov 2002
    Location
    New Jersey, USA
    Posts
    3,932
    Oracle provides a feature called label security which allows you to label individual records with such tags. It was first developed for government agencies to secure their data.

  8. #8
    Join Date
    Sep 2002
    Location
    Fantasy
    Posts
    4,254
    Level1 clearance, leverl 2 clearance and so on can be built in application coding. It is merely business logic. Basically you encrypt the tagged rows in different encryption and create views based on the tagged rows and give special user and permission to those views

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •