There are more and more databases of enterprises are connected to the internet, while many bugs are still existed in the database intrusion detection systems, the safety of database in network environment is becoming a more increasing problem.Hackers intrude the databases on internet by some known web attack techniques as SQL Injection, Cross Site Script, and Unauthorized-Users-Accessing et al. This tendency is increasing, according to the achievements of computer techniques.Therefore, protecting the safety of databases and improving the detecting ability of database intrusions are imminent problems in front of us.By scanning and monitoring the network environment, and monitoring combined with recording the database accessing flow, traditional database intrusion detection systems share a passive defense type by taking use of predefined safe rules. This type of defense systems could not perform the detection of unknown attack mode, nor the in-time and precise judgments on the attack itself, therefore make mistakes.We provide a database intrusion system based on honey-pot technique to solve the above mentioned problems. The proposed method takes use of the characteristics of the honey-pot as puzzling the intruder, transferring the attacked target, exhausting the resources of intruder, abilities of detecting the bugs of database and unknown attack techniques. Our system collects and analyzes the feature codes of the hacker’s attack to the database system, then applies them to the rules of database intrusion detection system. This strategy efficiently decreases the missing report ratio and improves the active defense ability of the system.We developed a database intrusion detection system based on honey-pot technique, followed by testing the system on its functions and performances with some general attack approaches. The testing results perfectly satisfied the original design expectations.Based on the theoretical and experimental confirmation, we can draw a conclusion as follows:The database intrusion detection system based on honey-pot technique can efficiently puzzle the intruder, transfer the attack target, exhaust the resources of intruder and detect the system bugs and new attack approaches. Our method improves the defense ability of the database intrusion system greatly. |