• Title/Summary/Keyword: SQL Audit

Search Result 7, Processing Time 0.025 seconds

Design and Implementation of SQL Audit Tool for Database Performance (데이터베이스 성능을 위한 SQL 감리 도구의 설계 및 구현)

  • Liu, Chen;Kim, Taewoo;Zheng, Baowei;Yeo, Jeongmo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.203-208
    • /
    • 2016
  • Information system audit is the requirement to configure the information system successfully. However, there is a problem with reduction of efficiency in the audit work when the system capacity is growing up. In the subsidiary field of information system audit, there is the same problem. In this paper, we will focus on the database audit, and implement an SQL audit tool in order to improve the performance of a database. During the designing phase of the SQL audit tool which aim to improve the performance of a database, we have analyzed the requirements of SQL audit work. Based on the aforementioned them, the process of the SQL audit tool has been designed with SQL audit features in accordance with information audit process. During the implementation phase, we have implemented 3 main function modules according to the output of the design phase. The main modules we implemented are the audit job definition module, audit job executing module and result reporting module. With the implemented tool, it applied to an Electric Power Corporation project in China and compared with other tools that are able to use SQL audit. In this paper, the implemented SQL audit tool is able to perform the general SQL audit work and to reduce the cost of the audit work for database performance and to raise the accuracy of result and to apply the extended inspection rule which need to use SQL parsing.

Design and Implementation of SQL Inspector for Database Audit Using ANTLR (ANTLR를 사용한 데이터베이스 감리용 SQL 검사기의 설계 및 구현)

  • Liu, Chen;Kim, Taewoo;Zheng, Baowei;Yeo, Jeongmo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.9
    • /
    • pp.425-432
    • /
    • 2016
  • As the importance of information audit is getting bigger, the public corporations invest many expenses at information system audit to build a high quality system. For this purpose, there are much research to proceed an audit effectively. In database audit works, it could audit utilizing a variety of monitoring tools. However, when auditing SQLs which might be affected to database performance, there are several limits related to SQL audit functionality. For this reason, most existing monitoring tools process based on meta information, it is difficult to proceed SQL audit works if there is no meta data or inaccuracy. Also, it can't detect problems by analysis of SQL's syntax structure. In this paper, we design and implement the SQL Inspector using ANTLR which is applied by syntax analysis technique. The overall conclusion is that the implemented SQL Inspector can work effectively much more than eye-checked way. Finally, The SQL inspector which we proposed can apply much more audit rules by compared with other monitoring tools. We expect the higher stability of information system to apply SQL Inspector from development phase to the operation phase.

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

An Implementation of DB Query Collecting and Analyzer Using Packet Interceptor (패킷 인터셉터를 이용한 DB 쿼리 수집 및 분석기 구현)

  • Lim, Jae-Deok;Lim, Sung-Han;Baek, Nam-Chul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.97-106
    • /
    • 2008
  • This proposed system is a part of internal control system that national highway need to support their ITS information audit. This paper explains the design and implementation of a packet interceptor and a DB query analyzer. The packet interceptor sniffs users' query packets, and then the DB query analyzer parses the SQL queries and stores the users' DB access information such as SQL queries, access data and changing data. The information may be used as the evidences on internal control of users and users' accesses.

  • PDF

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

An Implementation of Configuration Management in ISO 9000 Quality System (ISO 9000 품질시스템에서 형상관리의 구현에 관한 연구)

  • Chung, Nam-Kee;Choi, Jeong-Gil;Kim, Young-Sik;Park, Sang-Kyu;Kim, Jae-Jon;Hwang, Bu-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.2
    • /
    • pp.176-191
    • /
    • 2000
  • Configuration Management (CM) is a management discipline that applies technical and administrative direction to the development, production and support life cycle of a configuration item. This paper introduces an application of this disicipline to ISO 9000 quality systems. A proto type CM information system caned CM / ISO 9000 is implemented via a comparison and anal37sis of CM standards such as ISO 10007, MIL-STD-2549 and EIA Standard IS-649. This system demonstrates 4 basic CM functions consisting of configuratin identification, change control, configuration status accounting and configuration audit. In the system, configuration items such as documents and drafts can be managed to ensure effective ISO 9000 quality systems. Implementation is supported by IDEF0, IDFF1x in modeling, MS SQL Server Ver. 7.0 as DBMS and Visual Basic Ver. 6.0 for interface programming.

  • PDF

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.