A Logging Scheme for Database Audit


Database audit can strengthen the security of database. Logging database activities is usually the first step of implementing database audit. In this paper, we present a logging scheme for database audit. Unlike native database logging and auditing mechanism, our scheme is to monitor and log database activities through analyzing network traffic. The architecture of our scheme contains three principal components: packets capturing, packets parsing and data storage. First capture the packets to and from the database; then, by analyzing database communication protocols, parse the captured packets; finally, use the parsed results to support database audit.

1 Figure or Table

Cite this paper

@article{Huang2009ALS, title={A Logging Scheme for Database Audit}, author={Qiang Huang and Lianzhong Liu}, journal={2009 Second International Workshop on Computer Science and Engineering}, year={2009}, volume={2}, pages={390-393} }