Information retrieval system, its types and security issues
Size: 25.15 MB
Language: en
Added: Feb 25, 2025
Slides: 16 pages
Slide Content
Information Retrieval System Presentation by: Vaibhav soni
TEACH A COURSE 2 Agenda o1. Introduction to IR Systems o3. Web-Based IR System o4. Security Issues in IR System o2. Stand-Alone IR System
Introduction Information Retrieval System An Information Retrieval System (IRS) is a system designed to collect, organize, and retrieve relevant information from a large dataset based on user queries. These systems are commonly used in applications like search engines, databases, and digital libraries, where users need to search for specific information from large amounts of unstructured or structured data.
Query Information Retrieval System Search In Database Collect Relevant Documents Ranking of Document Relevancy
1st type: Stand-alone IRS A stand-alone Information Retrieval System (IRS) refers to an information retrieval system that operates independently, without the need for additional software or services, and often without relying on cloud-based infrastructure or internet connectivity. It is typically designed to search and retrieve data from local datasets, such as files, databases, or other collections stored on a single machine or local network. TEACH A COURSE 5
2nd Type : Web-based IRS A web-based Information Retrieval System (IRS) is an information retrieval system that is designed to operate over the internet, allowing users to search and retrieve information from remote data sources through a web interface. Unlike a stand-alone IRS that runs locally, a web-based IRS is typically deployed on a server and accessed via a web browser, making it accessible from anywhere with internet connectivity. Example:- Google, ChatGPT, Gemini etc. TEACH A COURSE 6
Security Challenges in IR System o1. Data Privacy o2. Access control and Authentication o3. Data Tampering o4. Phishing and Social Engineering o5. DOS and DDOS Attack 8
o1: Data Privacy Sensitive Data Exposure : IR systems may handle sensitive or personal data. Without proper encryption and access control, unauthorized users could access this data. User Search History : Search logs and histories can reveal sensitive user information (e.g., health-related searches or financial data). If not properly protected, this data could be exposed or misused. 9
o2: Access control & Authentication Weak Authentication : If an IR system does not have strong user authentication mechanisms (e.g., weak passwords or lack of two-factor authentication), unauthorized individuals could gain access to the system and retrieve sensitive data. Improper Access Control : Lack of proper access control mechanisms can lead to privilege escalation. Users may gain access to data or functionality they are not authorized to use. 10
o3: Data Tampering Data tampering in information retrieval systems is a serious issue that can lead to inaccurate results, security vulnerabilities, and loss of trust. Protecting against such tampering requires a combination of robust security measures, including encryption, integrity checks, access controls, and anomaly detection. Addressing these risks is critical to maintaining the reliability and security of information retrieval systems. 11
o4: Phishing and Social Engineering Fake Systems or Interfaces : An attacker could create a fake search interface or an imitated IR system to steal sensitive information from users, either by tricking them into submitting personal data or by spreading malware. 12
o5: DOS & DDOS Attack Denial of Service (DoS) : A DoS attack on an Information Retrieval system can lead to significant disruptions in the availability and performance of the system, with potential financial and reputational consequences. To protect against such attacks, it is essential to implement a combination of preventive measures such as rate-limiting, traffic filtering, etc. Distributed Denial of Service (DDoS) : A distributed attack might make it hard to distinguish legitimate from malicious traffic, disrupting the service. 13
scrb.bihar.gov.in User limit of 1000-2000 But more than 7000 students watching live and visited the website at the same time. 7000+ Server Crash In the Previous video server has indirectly done DDOS attack which leads to crash the Bihar police government website.