Implementation of honeytokens in RDBMS Oracle 9iR2 EE for internal malicious activity detection
Date
2005Author
Čenys, Antanas
Rainys, Darius
Radvilavičius, Lukas
Goranin, Nikolaj
Metadata
Show full item recordAbstract
Information stored in companies’ databases is often the most valuable one and as a result database security is of great importance. It is a very complex task, however, to ensure database security without limiting capabilities and productivity of legal users. Honeytokens are one of the new methods to increase information security. The method uses fake information resources to attract illegal users and identify them. In the paper implementation of honeytoken module for Oracle 9iR2 database management system is described. Three original modules were programmed to combine Oracle Fine-Graned auditing features, internal triggers and functions reporting on illegal access to fake resource.
