Detection of Temporal Data Ex-filtration Threats to Relational Databases

被引:2
|
作者
Sallam, Asmaa [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018) | 2018年
关键词
Insider Threats; Data Analytics for Security; Relational Databases; Anomaly Detection; Temporal Attacks; ANOMALY DETECTION;
D O I
10.1109/CIC.2018.00030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to recent reports, the most common insider threats to systems are unauthorized access to or use of corporate information and exposure of sensitive data. While anomaly detection techniques have proved to be effective in the detection of early signs of data theft, these techniques are not able to detect sophisticated data misuse scenarios in which malicious insiders seek to aggregate knowledge by executing and combining the results of several queries. We thus need techniques that are able to track users' actions across time to detect correlated ones that collectively flag anomalies. In this paper, we propose such techniques for the detection of anomalous accesses to relational databases. Our approach is to monitor users' queries, sequences of queries and sessions of database connection to detect queries that retrieve amounts of data larger than the normal. Our evaluation of the proposed techniques indicates that they are very effective in the detection of anomalies.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [21] Beyond Relational Databases: Preserving the Data
    Ramalho J.C.
    Ferreira B.
    Faria L.
    Ferreira M.
    New Review of Information Networking, 2020, 25 (02) : 107 - 118
  • [22] Managing Unstructured Data in Relational Databases
    Yafooz, Wael M. S.
    Abidin, Siti Z. Z.
    Omar, Nasiroh
    Idrus, Zanariah
    2013 IEEE CONFERENCE ON SYSTEMS, PROCESS & CONTROL (ICSPC), 2013, : 198 - 203
  • [23] On extending the relational data model for relational databases with incomplete information
    Motzkin, D.
    Mathematical Modelling and Scientific Computing, 1993, 2 (sectiob):
  • [24] Dynamic Prediction Based Watermarking for Temporal Relational Databases
    Unnikrishnan, K.
    Pramod, K., V
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 140 - 145
  • [25] Dealing with temporal indeterminacy in relational databases: An AI methodology
    Anselma, Luca
    Piovesan, Luca
    Terenziani, Paolo
    AI COMMUNICATIONS, 2019, 32 (03) : 207 - 221
  • [26] Irregular Indeterminate Repeated Facts in Temporal Relational Databases
    Terenziani, Paolo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (04) : 1075 - 1079
  • [27] Integrity constraints in temporal relational databases extended abstract
    Tansel, AU
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 460 - 464
  • [28] A HOMOGENEOUS RELATIONAL MODEL AND QUERY LANGUAGES FOR TEMPORAL DATABASES
    GADIA, SK
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1988, 13 (04): : 418 - 448
  • [29] Efficiently Labeling and Retrieving Temporal Anomalies in Relational Databases
    Khnaisser, Christina
    Hamrouni, Hind
    Blumenthal, David B.
    Dignos, Anton
    Gamper, Johann
    INFORMATION SYSTEMS FRONTIERS, 2024,
  • [30] On the concept of transaction atomicity in distributed temporal relational databases
    DeCastro, C
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS - PROCEEDINGS OF THE ISCA 9TH INTERNATIONAL CONFERENCE, VOLS I AND II, 1996, : 788 - 795