Intrusion Detection and
Database Systems

 
What did we come up with?
Our concept was for data to be fed into an RDBMS system, where it would be searchable via SQL select statements. We didn't know what to expect, however, in terms of database performance under this sort of data. Therefore, we decided to try several different approaches, and compare their performance against eachother, as well as comparing their performance against the performace of a real-world IDS package. We chose to use the IDIOT intrusion detection system, as it was readily available here at Purdue, and worked on Sparc Solaris machines wih the BSM audit logging facility.
 
How does it work?
These different approaches are interesting enough on their own to merit individual discussions. Each of the three currently implemented schemas are detailed below.
   Schema Details:
Flat Schema
Normalized Schema
Hybrid Approach