Abstract
This paper is the current approach database security of organization need layers of security around their data, with each layer protecting a specific area. The current trend of security attack is targeting any valuable data stored in a database such as financial data and student mark, including data theft, data modification or replay and data disruption. To understand how the system works, the system setting and the weaknesses of Enterprise Distributed Database. This paper is about the design and development to secure database access, a framework based on packet and content filtering on IP address, port and SQL statement. And simulate the framework and design database security framework. We address how to build the outcome of this is to reduce the risk of data manipulation and reduce the impact of internal threat and malicious insiders. The result shows that the proposed method succeeded in meeting those aspects of information security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guimaraes, M., Mattord, H., Austin, R.: Incorporating Security Components into Database Courses. Hewlett Packard, Atlanta (2005)
Natan, R.B.: Implementing database security and auditing. In: Database as a Networked Server (2005)
Kev, D.: Dig yourself out of the data crater—database security isn’t new, so why can’t we get it right? Netw. Secur. Mag. 7–10 (October, 2005)
Rowan, T.: Application firewalls: filling the void. Netw. Secur. pp. 4–5 (2007)
Byrne, P.: Application firewalls in a defense-in-depth design. Netw. Secur. pp. 9–10 (2006)
Noraziah, A., Ahmed, N.A., Roslina, M.S.: Data replication using read-one-write-all monitoring synchronization transaction system in distributed environment. J. Comput. Sci. 6(10), 1066–1069 (2010)
Acknowledgements
Appreciation conveyed to Ministry of Higher Education Malaysia for project financing under Fundamental Research Grant Scheme RDU140101, and University Malaysia Pahang Short Term Grant RDU120331 and GRS130334.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Fairuzullah, A., Noraziah, A., Mohd, W.M.W., Herawan, T. (2019). A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall. In: Abawajy, J., Othman, M., Ghazali, R., Deris, M., Mahdin, H., Herawan, T. (eds) Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015) . Lecture Notes in Electrical Engineering, vol 520. Springer, Singapore. https://doi.org/10.1007/978-981-13-1799-6_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-1799-6_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1797-2
Online ISBN: 978-981-13-1799-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)