Detection of Temporal Data Ex-filtration Threats to Relational Databases

被引:2
|
作者
Sallam, Asmaa [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018) | 2018年
关键词
Insider Threats; Data Analytics for Security; Relational Databases; Anomaly Detection; Temporal Attacks; ANOMALY DETECTION;
D O I
10.1109/CIC.2018.00030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to recent reports, the most common insider threats to systems are unauthorized access to or use of corporate information and exposure of sensitive data. While anomaly detection techniques have proved to be effective in the detection of early signs of data theft, these techniques are not able to detect sophisticated data misuse scenarios in which malicious insiders seek to aggregate knowledge by executing and combining the results of several queries. We thus need techniques that are able to track users' actions across time to detect correlated ones that collectively flag anomalies. In this paper, we propose such techniques for the detection of anomalous accesses to relational databases. Our approach is to monitor users' queries, sequences of queries and sessions of database connection to detect queries that retrieve amounts of data larger than the normal. Our evaluation of the proposed techniques indicates that they are very effective in the detection of anomalies.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [31] EVENT-JOIN OPTIMIZATION IN TEMPORAL RELATIONAL DATABASES
    SEGEV, A
    GUNADHI, H
    VERY LARGE DATA BASES - PROCEEDINGS, 1989, : 205 - 215
  • [32] A Novel Method for Intrusion Detection in Relational Databases
    Ramachandran, Raji
    Arya, P.
    Jayanthy, P. G.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 230 - 235
  • [33] A comprehensive approach to anomaly detection in relational databases
    Spalka, A
    Lehnhardt, J
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 207 - 221
  • [34] The complexity of dependency detection and discovery in relational databases
    Blaesius, Thomas
    Friedrich, Tobias
    Schirneck, Martin
    THEORETICAL COMPUTER SCIENCE, 2022, 900 : 79 - 96
  • [35] Manipulation of exclusive disjunctive data in relational databases
    Chiu, JS
    Chen, ALP
    DATA & KNOWLEDGE ENGINEERING, 1997, 22 (01) : 39 - 65
  • [36] Study of watermarking nonnumeric data in relational databases
    Dong, Xiaomei
    Tian, Yueping
    Li, Xiaohua
    Yu, Ge
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2008, 33 (10): : 1026 - 1029
  • [37] Inductive databases in the relational model: The data as the bridge
    Kramer, Stefan
    Aufschild, Volker
    Hapfelmeier, Andreas
    Jarasch, Alexander
    Kessler, Kristina
    Reckow, Stefan
    Wicker, Joerg
    Richter, Lothar
    KNOWLEDGE DISCOVERY IN INDUCTIVE DATABASES, 2006, 3933 : 124 - 138
  • [38] Aggregation Queries of Uncertain Data in Relational Databases
    Xie, Dong
    Xiao, Jie
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 69 - 71
  • [39] Managing Textual Data Semantically In Relational Databases
    Yafooz, Wael M. S.
    Abdin, Siti Zalaha
    Fahad, S. K. Ahammad
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [40] A Data Sorted Method for the Rough Relational Databases
    Wei, Ling-ling
    Xie, Qiang-lai
    COMPUTING AND INTELLIGENT SYSTEMS, PT III, 2011, 233 : 212 - 217