Font Size: a A A

A New Method Of Rule-baesd Database Security Detection

Posted on:2005-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:R E DaiFull Text:PDF
GTID:2168360152468055Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Database Management System (DBMS) is very important and complicated. Database Administrators (DBAs) are difficult to administrate their DBMS correctly and detect the potential security problems. Database Security Detection System, however, can detect and recover the security problems in DBMSs. This thesis starts by presenting the development of database security researches. The author points out that the existing Database Security Detection System is problematic because of its insufficiency in design, which causes abstract, portability problems.Based on the problems of exesting Database Security Detection System, and the rules in Intrusion Detection System (IDS), the author proposes a new method to realize Database Security Detection System by using rules, and designs a set of rules, named TSY Rules, in XML grammar. This paper will have detail descriptions about its origin, syntax, usage method and advantages. With the help of TSY Rules, the author has designed and accomplished a new Database Security Detection System. This thesis presents how to design this new system and how each module works. In contrast with the nowadays Database Security Detection System, the new system overcomes the weakness of original system, and has more practical value.Finally, this paper will introduce the author's research of Weak-keys in Discrete Logarithm. After analyzing Discrete Logarithm, the author proposes there are Weak-keys in Public Key Cryptosystem based on Discrete Logarithm. Then, a new attack method has been designed, which is able to accomplish the attack when Weak-keys exist in Public Key Cryptosystem based on Discrete Logarithm. In summary, the author's works are listed below:The author proposes a method of using rules to realize Database Security Detection System.The author designs a set of rules, named TSY Rules, which can be used to accomplish Database Security Detection System.The author designs and accomplishes a new Database Security Detection System with the use of TSY Rules. The new Database Security Detection System overcomes the defects of original system, and has more practical value.The author proposes there are Weak-keys in Public Key Cryptosystem based on Discrete Logarithm.The author designs a new attack method which can be accomplished when Weak-keys exist in Public Key Cryptosystem based on Discrete Logarithm.
Keywords/Search Tags:Database, Security, Detection, TSY Rules, Weak-keys
PDF Full Text Request
Related items