Browse > Article
http://dx.doi.org/10.7840/kics.2014.39C.8.716

Design of the Specific IP Access Deny for the Database  

Jang, Seung-Ju (Dongeui University Department of Computer Engineering)
Kim, Sung-Jin (Dongeui University Department of Computer Engineering)
Abstract
This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.
Keywords
Oracle; Database; DB Vulnerability; IP blocking; DB Listener;
Citations & Related Records
Times Cited By KSCI : 9  (Citation Analysis)
연도 인용수 순위
1 J. H. Lee, J. S. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B, no. 12, pp. 944-953, 2013.   과학기술학회마을   DOI   ScienceOn
2 W. S. Seo and M. S. Jun "The management and security plans of a separated virtualization infringement type learning database using VM (virtual machine)," J. KICS, vol. 36, no. 8, pp. 947-953, 2011.   과학기술학회마을   DOI   ScienceOn
3 P.-H. Jo, J.-I. Lim, and H.-K. Kim "A study on improvement of security vulnerabilities in intelligent transport system," J. The Korea Inst. Inf. Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 531-543, 2013.   DOI   ScienceOn
4 D.-J. Kim and S.-J. Cho "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability database," Internet lnf. Security, vol. 1, no. 2, pp. 130- 147, 2010.
5 I.-Y. Mun and S.-M. Oh "Vulnerability analyzers for the mobile application the design and implementation," J. Korea Multimedia Soc., vol. 14, no. 10, pp. 1335-1347, Oct. 2011.   DOI   ScienceOn
6 S.-M. Yang and J. S. Park "An efficient access control mechanism for secure surveillance systems," J. KICS, vol. 39B, no. 4, pp. 228-233, 2014.   과학기술학회마을   DOI   ScienceOn
7 J.-S. Park, M.-H. Park, and S.-H. Jung "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013.   과학기술학회마을   DOI   ScienceOn
8 H.-U. Yoo, J.-H. Yun, and T.-S. Shon "Whitelist-based anomaly detection for industrial control system security," J. KICS, vol. 38B, no. 8, pp. 641-653, 2013.   과학기술학회마을   DOI   ScienceOn
9 Y.-H. Lee, J. H. Kang, and S. J. Lee "A specification-based intrusion detection mechanism for LEACH protocol," J. KICS, vol. 37B, no. 2, pp. 138-147, 2012.   과학기술학회마을   DOI   ScienceOn
10 J. S. Kim, DB security for the protection of personal information(2006), Retrieved Dec., 10, 2013, from http://blog.naver.com/mybrainz/150007657976
11 Wikipedia vulnerability(2012), Retrieved Dec. 12, 2013, from http://ko.wikipedia.org/
12 DB Vulnerability Analysis Summary, Retrieved Dec. 20, 2013, from www.DBGuide.net
13 Listener(2009), Retrieved Dec., 2, 2013, from http://www.netbuysell.co.kr/global_asp/board/board_view.asp?Codeno=5&K_no=359&Pgtype=A
14 S. H. Lee, Y. J. Maeng, D. H. Nyang, and K. H. Lee, "Possibility of disclosure of user information in internet explorer," J. KICS, vol. 38B, no. 12, pp. 937-943, 2013.   과학기술학회마을   DOI   ScienceOn