Inferential attack

In this kind attack there is no actual transfer of data, but the attacker is able to reconstruct the information by sending particular requests and observing the resulting behaviour of the website / database server.

Inference detection can be done during the design of the database, by altering the design of the database and changing access control regimes to eliminate inference channels, or at query time, if an inference channel is found in a query, it is either denied or altered.