Detection of Temporal Data Ex-filtration Threats to Relational Databases

被引:2
|
作者
Sallam, Asmaa [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018) | 2018年
关键词
Insider Threats; Data Analytics for Security; Relational Databases; Anomaly Detection; Temporal Attacks; ANOMALY DETECTION;
D O I
10.1109/CIC.2018.00030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to recent reports, the most common insider threats to systems are unauthorized access to or use of corporate information and exposure of sensitive data. While anomaly detection techniques have proved to be effective in the detection of early signs of data theft, these techniques are not able to detect sophisticated data misuse scenarios in which malicious insiders seek to aggregate knowledge by executing and combining the results of several queries. We thus need techniques that are able to track users' actions across time to detect correlated ones that collectively flag anomalies. In this paper, we propose such techniques for the detection of anomalous accesses to relational databases. Our approach is to monitor users' queries, sequences of queries and sessions of database connection to detect queries that retrieve amounts of data larger than the normal. Our evaluation of the proposed techniques indicates that they are very effective in the detection of anomalies.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [1] Detection of Temporal Insider Threats to Relational Databases
    Sallam, Asmaa
    Bertino, Elisa
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 406 - 415
  • [2] Result-Based Detection of Insider Threats to Relational Databases
    Sallam, Asmaa
    Bertino, Elisa
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 133 - 143
  • [3] Temporal data modelling and integrity constraints in relational databases
    Tansel, Abdullah Uz
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2024, 9 (01) : 1 - 20
  • [4] Temporal data modeling and integrity constraints in relational databases
    Tansel, AU
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2004, PROCEEDINGS, 2004, 3280 : 459 - 469
  • [5] Realisation of temporal databases: A comparison of the conventional relational data model with a temporal extension
    Myrach, T
    WIRTSCHAFTSINFORMATIK, 1997, 39 (01): : 35 - &
  • [6] Preferences in Temporal Relational Databases
    Anselma, Luca
    Terenziani, Paolo
    IEEE ACCESS, 2024, 12 : 65418 - 65427
  • [7] Data and syntax centric anomaly detection for relational databases
    Sallam, Asmaa
    Fadolalkarim, Daren
    Bertino, Elisa
    Xiao, Qian
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2016, 6 (06) : 231 - 239
  • [8] Evaluating a Temporal Relational Algebra Supporting Preferences in Temporal Relational Databases
    Anselma, Luca
    Coviello, Antonella
    Terenziani, Paolo
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2024, 2024, 14918 : 32 - 44
  • [9] Coping with Events in Temporal Relational Databases
    Terenziani, Paolo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (05) : 1181 - 1185
  • [10] Relational databases for motion data
    Riaz Q.
    Krüger B.
    Weber A.
    International Journal of Innovative Computing and Applications, 2016, 7 (03) : 119 - 134