TY - GEN
T1 - Protecting databases from query flood attacks
AU - Squicciarini, Anna Cinzia
AU - Paloscia, Ivan
AU - Bertino, Elisa
PY - 2008
Y1 - 2008
N2 - A typical Denial of Service attack against a DBMS may occur through a query flood, that is, a large number of queries and/or updates sent by a malicious subject or several colluding malicious subjects to a target database with the intention to hinder other subjects from being serviced. In this paper we present experimental results showing that such attacks indeed degrade the performance of the DBMS; our experiments are conducted on several well known DBMS. We then propose some simple yet effective techniques for detecting query-flood attacks and protecting a DBMS against them.
AB - A typical Denial of Service attack against a DBMS may occur through a query flood, that is, a large number of queries and/or updates sent by a malicious subject or several colluding malicious subjects to a target database with the intention to hinder other subjects from being serviced. In this paper we present experimental results showing that such attacks indeed degrade the performance of the DBMS; our experiments are conducted on several well known DBMS. We then propose some simple yet effective techniques for detecting query-flood attacks and protecting a DBMS against them.
UR - http://www.scopus.com/inward/record.url?scp=52649173690&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=52649173690&partnerID=8YFLogxK
U2 - 10.1109/ICDE.2008.4497555
DO - 10.1109/ICDE.2008.4497555
M3 - Conference contribution
AN - SCOPUS:52649173690
SN - 9781424418374
T3 - Proceedings - International Conference on Data Engineering
SP - 1358
EP - 1360
BT - Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, ICDE'08
T2 - 2008 IEEE 24th International Conference on Data Engineering, ICDE'08
Y2 - 7 April 2008 through 12 April 2008
ER -