Detection of Temporal Data Ex-filtration Threats to Relational Databases

被引:2
|
作者
Sallam, Asmaa [1 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018) | 2018年
关键词
Insider Threats; Data Analytics for Security; Relational Databases; Anomaly Detection; Temporal Attacks; ANOMALY DETECTION;
D O I
10.1109/CIC.2018.00030
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to recent reports, the most common insider threats to systems are unauthorized access to or use of corporate information and exposure of sensitive data. While anomaly detection techniques have proved to be effective in the detection of early signs of data theft, these techniques are not able to detect sophisticated data misuse scenarios in which malicious insiders seek to aggregate knowledge by executing and combining the results of several queries. We thus need techniques that are able to track users' actions across time to detect correlated ones that collectively flag anomalies. In this paper, we propose such techniques for the detection of anomalous accesses to relational databases. Our approach is to monitor users' queries, sequences of queries and sessions of database connection to detect queries that retrieve amounts of data larger than the normal. Our evaluation of the proposed techniques indicates that they are very effective in the detection of anomalies.
引用
收藏
页码:146 / 155
页数:10
相关论文
共 50 条
  • [41] ReStore - Neural Data Completion for Relational Databases
    Hilprecht, Benjamin
    Binnig, Carsten
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 710 - 722
  • [42] Appropriate inferences of data dependencies in relational databases
    Biskup, Joachim
    Link, Sebastian
    ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2011, 63 (3-4) : 213 - 255
  • [43] An intensional approach for periodic data in relational databases
    Paolo Terenziani
    Bela Stantic
    Alessio Bottrighi
    Abdul Sattar
    Journal of Intelligent Information Systems, 2013, 41 : 151 - 186
  • [44] Manipulation of exclusive disjunctive data in relational databases
    Chiu, Jui-Shang
    Chen, Arbee L.P.
    Data and Knowledge Engineering, 1997, 22 (01): : 39 - 65
  • [45] Data Management: Relational vs Blockchain Databases
    Chitti, Phani
    Murkin, Jordan
    Chitchyan, Ruzanna
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE 2019), 2019, 349 : 189 - 200
  • [46] Data-driven publication of relational databases
    Guehis, Sonia
    Rigaux, Philippe
    Waller, Emmanuel
    10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 267 - 272
  • [47] The relational modeling of hierarchical data in biodiversity databases
    Novotny, Petr
    Wild, Jan
    DATABASE-THE JOURNAL OF BIOLOGICAL DATABASES AND CURATION, 2024, 2024
  • [48] Fingerprinting of Relational Databases for Stopping the Data Theft
    Al Solami, Eesa
    Kamran, Muhammad
    Alkatheiri, Mohammed Saeed
    Rafiq, Fouzia
    Alghamdi, Ahmed S.
    ELECTRONICS, 2020, 9 (07) : 1 - 20
  • [49] The Pastwatch: On the usability of provenance data in relational databases
    AlOmeir, Omar
    Lai, Eugenie Yujing
    Milani, Mostafa
    Pottinger, Rachel
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 1886 - 1889
  • [50] A data sorted method for the rough relational databases
    Wei, Ling-ling
    Xie, Qiang-lai
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 175 - 178