Threat Detection

Real-Time Threat Detection

Automatically detect SQL injection, anomalous behavior, privilege escalation, and data exfiltration attempts before they compromise your databases.

Multi-Layer Detection Engine

DB Audit combines signature-based detection, machine learning anomaly detection, and behavioral analysis to identify threats that traditional tools miss. Our detection engine processes queries in real-time with sub-millisecond latency.

<1ms
Detection latency
99.9%
Detection accuracy
0.01%
False positive rate

Detection Capabilities

SQL Injection Detection

Comprehensive SQL injection detection using pattern matching, semantic analysis, and query structure validation. Block attacks before they reach your database.

Why SQL Injection Matters

SQL injection remains the #1 database attack vector. Even parameterized queries can be vulnerable to second-order injection. DB Audit detects injection attempts at the database layer regardless of application defenses.

patterns Regex-based detection of known injection patterns including UNION, comment sequences, and stacked queries.
semantic_analysis Detect tautologies (OR 1=1), syntax errors, and logical anomalies that indicate manipulation.
actions Configure response actions: block, alert, log, or quarantine suspicious queries.
# SQL Injection Detection Configuration
detection:
  sql_injection:
    enabled: true
    sensitivity: high

    # Pattern-based detection
    patterns:
      - name: union_injection
        pattern: "UNION\s+(ALL\s+)?SELECT"
        severity: critical

      - name: comment_injection
        pattern: "(--|#|/\*).*(OR|AND)\s+['"]?\d"
        severity: high

      - name: stacked_queries
        pattern: ";\s*(DROP|DELETE|UPDATE|INSERT)"
        severity: critical

    # Semantic analysis
    semantic_analysis:
      enabled: true
      detect_tautologies: true  # OR 1=1, OR 'a'='a'
      detect_syntax_errors: true

    # Actions on detection
    actions:
      - block_query
      - alert:
          severity: critical
          channels: [slack, pagerduty]
      - log_full_context

Anomaly Detection

Machine learning models build behavioral baselines for each user, application, and database. Detect deviations that may indicate compromised credentials or insider threats.

Behavioral Baselines

Learn normal patterns from historical data

Time-Aware

Adjust sensitivity for off-hours and weekends

Per-User Profiles

Individual baselines for each database user

Adaptive Thresholds

Self-tuning based on feedback

# Anomaly Detection Configuration
detection:
  anomaly:
    enabled: true

    # Behavioral baselines
    baseline:
      learning_period: 14d
      update_frequency: 24h
      minimum_samples: 1000

    # Detection thresholds
    thresholds:
      query_volume:
        deviation: 3.0  # Standard deviations
        window: 1h

      data_access:
        deviation: 2.5
        window: 15m

      new_tables_accessed:
        max_new_tables: 5
        window: 1h

      query_complexity:
        deviation: 2.0
        window: 30m

    # Time-based rules
    time_rules:
      - name: off_hours
        hours: "22:00-06:00"
        sensitivity_multiplier: 2.0

      - name: weekend
        days: [saturday, sunday]
        sensitivity_multiplier: 1.5

Privilege Escalation Detection

Monitor all privilege-related operations including GRANT, REVOKE, role changes, and user creation. Detect unauthorized attempts to elevate access or bypass controls.

monitored_operations Track GRANT, REVOKE, CREATE USER, ALTER USER, and role modifications.
rules Define conditions that trigger alerts based on operation type and context.
require_approval Queue sensitive operations for manual approval before execution.
# Privilege Escalation Detection
detection:
  privilege_escalation:
    enabled: true

    # Monitor these operations
    monitored_operations:
      - GRANT
      - REVOKE
      - CREATE USER
      - ALTER USER
      - CREATE ROLE
      - ALTER ROLE
      - SET ROLE

    # Alert conditions
    rules:
      - name: admin_role_grant
        condition: "GRANT.*SUPERUSER|ADMIN|DBA"
        severity: critical
        immediate: true

      - name: new_user_creation
        condition: "CREATE USER"
        severity: high
        require_approval: true

      - name: role_elevation
        condition: "SET ROLE.*admin"
        severity: high
        log_session: true

    # Whitelist legitimate operations
    exceptions:
      users: [terraform, migration_user]
      applications: [provisioning_service]

Data Exfiltration Detection

Identify potential data theft through volume analysis, pattern detection, and export monitoring. Stop unauthorized data extraction before it leaves your systems.

Proactive Protection

Unlike traditional DLP that monitors network traffic, DB Audit detects exfiltration at the source—before data leaves the database. This catches attacks that bypass network controls.

volume_rules Detect unusual data volumes based on row counts and time windows.
patterns Identify systematic scanning, table enumeration, and schema reconnaissance.
export_commands Monitor COPY, pg_dump, mysqldump, and other export utilities.
# Data Exfiltration Detection
detection:
  data_exfiltration:
    enabled: true

    # Volume-based detection
    volume_rules:
      - name: large_export
        row_threshold: 100000
        time_window: 5m
        severity: high

      - name: bulk_select
        tables: [customers, orders, transactions]
        row_threshold: 10000
        severity: medium

    # Pattern-based detection
    patterns:
      - name: table_enumeration
        condition: "SELECT * FROM information_schema"
        severity: medium

      - name: systematic_scan
        condition: "sequential_table_access > 10"
        time_window: 10m
        severity: high

    # Export command monitoring
    export_commands:
      monitor: [COPY, pg_dump, mysqldump, bcp]
      require_approval: true
      log_destination: true

    # Response actions
    actions:
      high:
        - terminate_session
        - alert_security_team
        - preserve_evidence
      medium:
        - alert
        - increase_logging

Threat Intelligence Sources

DB Audit combines multiple detection methods for comprehensive threat coverage. Custom rules can be added for organization-specific threats.

Known Attack Signatures
Database of known SQL injection and attack patterns
Behavioral Baselines
ML-generated normal behavior profiles per user and application
Threat Intelligence
Integration with external threat feeds and IP reputation services
Custom Rules
User-defined detection rules for organization-specific threats
Query Fingerprinting
Identify new or unusual query patterns automatically
Session Analysis
Correlate activity across sessions to detect persistent threats

Automated Response Actions

Configure automated responses to detected threats based on severity. From logging to session termination, take immediate action on threats.

# Response action configuration
response_actions:
  critical:
    - block_query          # Prevent query execution
    - terminate_session    # End the database session
    - alert:
        channels: [pagerduty, slack]
        immediate: true
    - preserve_evidence    # Capture full session context

  high:
    - block_query
    - alert:
        channels: [slack, email]
    - increase_logging     # Enable verbose logging

  medium:
    - alert:
        channels: [email]
    - log_details

  low:
    - log_details          # Record for review

Ready to Detect Database Threats?

Start protecting your databases with real-time threat detection. Identify SQL injection, anomalies, and data exfiltration before they cause damage.