Securing your corporate database

Spotting and blocking potential abuse

Beginner's guide to SSL certificates

Much is written about network security. There are many classes of product that have been developed to manage network access and to inspect traffic in order to identify anomalous behaviour.

This approach starts from the outside of the network and moves inwards. With security at the gateway delivered by a variety of appliances, traffic within the network can be further managed using VLANs, routers and departmental firewalls.

One of the focuses has been on protecting databases that sit behind web applications. Hackers have a variety of techniques that they use to try and fool the application layer into passing commands back to the database and retrieving information. A database does not make a decision about the query you put to it, if the query is valid, it will give you a result.

Unfortunately, stopping the hacker at the gateway or the web application is not sufficient to guarantee the security of the corporate information. Any hacker who has succeeded in penetrating the network can move directly to an attack on the database without any further barriers in their way. With stories circulating about organised crime infiltrating companies with experienced IT workers, it's worth bearing in mind also that any user with legitimate credentials can run unusual queries or extract information from a corporate database. Examples would be users checking their own or their friends' credit records, looking up call records in billing databases, etc.

So how exactly do you put a stop to the possibility that a user on a white list might suddenly decide to start doing things they shouldn't? How do you stop badly written web code from compromising your database before it is released and someone finds the flaw days later? The answer is to undertake some form of behavioural analysis, an intelligent guess at what legitimate database activity looks like for your company and your network. If you know what the normal patterns of database activities are for all users and middleware applications, you can flag or prevent those which are out of the ordinary.

This is the approach that has been taken by Secerno, a start-up company that is about to launch its first product set, which includes the Secerno SQL Controller and SQL Assurance Appliance. Using a patented machine learning technique, the system analyses a set of recorded and approved application data flows from the customer network and builds a model of expected behaviour. This automatic process takes a relatively short period of time, and completely removes the need for the brute force scripting and white and black list techniques that would be required to approach the same capability without machine learning.

Sitting in line with the database connection, the Secerno solution looks at all the database transactions and either alerts the administrator (or if you desire blocks the request) for those that appear out of the ordinary. The unit is capable of keeping up with even large databases, and can also sit in parallel in a passive monitoring mode if required. The key to Secerno's approach is that the learning system develops a picture of allowable behaviour, rather than having it scripted by a database expert who has to understand all the applications that are used in the organisation and how they work. This provides a high degree of accuracy and saves enormously on time and cost.

Given the value of the information in the typical corporate database and the general trend we are seeing towards more "intelligent" approaches to security, solutions such as this are likely to be received well by the market. We will be tracking early adoption activity of this.

In the meantime, let us know if you have experience of this kind of technology or any thoughts on its relevance and practicality. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story


10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.