A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks

被引:0
|
作者
Moon, Cheolmin Sky [1 ]
Chung, Sam [1 ,2 ]
Endicott-Popovsky, Barbara [2 ]
机构
[1] Univ Washington, Inst Technol, Comp Sci & Syst, Tacoma, WA USA
[2] Univ Washington, Ctr Informat Assurance & Cybersecur, Seattle, WA 98195 USA
关键词
Insider attacks; Database audit logs; File system audit logs; Monitoring; Cloud computing; In-memory database;
D O I
10.1007/978-3-319-05149-9_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a response of emerging insider attacks targeting on database, we are proposing architecture of database protection system from insider attacks. Existing pattern matching approach to detect insider attacks cannot provide perfect solution because of false positive and true negative ratios. Accordingly, we still need reasoning by a human at the last decision to declare that the insider is malicious or not using analysis on history of transaction logs performed by the insider. To construct a system with the consideration above, the system needs to satisfy following requirements: (1) effective monitoring and analysis on large amount of log data (2) scalable system depending on increase or decrease of the log data, and (3) prompt analysis even though the amount of the log data is large enough. We propose a two-tier, distributed, cloud, and in-memory computing based architecture. The proposed architecture brings several benefits such as managing a large amount of log data, distributing analysis workload over multiple nodes, being scalable on big log data, and supporting real-time analysis of big log data.
引用
收藏
页码:260 / 271
页数:12
相关论文
共 50 条
  • [31] A two-tier bipartite graph task allocation approach based on fuzzy clustering in cloud-fog environment
    Gad-Elrab, Ahmed A. A.
    Noaman, Amin Y.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 103 : 79 - 90
  • [32] Small-Cell Planning Based on Uplink Interference and Traffic in Two-Tier Cellular System
    Li, Yue
    Sun, Kai
    Cai, Lin
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [33] Development of an interactive mathematics learning system based on a two-tier test diagnostic and guiding strategy
    Yang, Tzu-Chi
    Fu, Hseng-Tz
    Hwang, Gwo-Jen
    Yang, Stephen J. H.
    AUSTRALASIAN JOURNAL OF EDUCATIONAL TECHNOLOGY, 2017, 33 (01) : 62 - 80
  • [34] Recommender system architecture based on Mahout and a main memory database
    Zhegao Piao
    Seong Joon Yoo
    Yeong Hyeon Gu
    Jaechun No
    Zhiyan Jiang
    Helin Yin
    The Journal of Supercomputing, 2018, 74 : 105 - 121
  • [35] Recommender system architecture based on Mahout and a main memory database
    Piao, Zhegao
    Yoo, Seong Joon
    Gu, Yeong Hyeon
    No, Jaechun
    Jiang, Zhiyan
    Yin, Helin
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (01): : 105 - 121
  • [36] Two-Tier VoI Prioritization System on Requirement-Based Data Streaming toward IoT
    Choochotkaew, Sunyanan
    Yamaguchi, Hirozumi
    Higashino, Teruo
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [37] Developing a game-based learning system with two-tier diagnostic tool for math courses
    Yang, Kai-Hsiang
    Chu, Hui-Chun
    Lu, Bou-Chuan
    Chen, Jhen-Yuan
    2015 IIAI 4TH INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS (IIAI-AAI), 2015, : 363 - 366
  • [38] Germany's UNESCO Global Geoparks and National GeoParks: Experiences from a Two-Tier System
    Megerle, Heidi Elisabeth
    Ellger, Christof
    LAND, 2023, 12 (01)
  • [39] The social-psychological perspective on executive compensation: evidence from a two-tier board system
    Schwering A.
    Sommer F.
    Uepping F.
    Winkelmann S.
    Journal of Business Economics, 2022, 92 (2) : 309 - 345
  • [40] Research and Practice of Open Test Database System Based on Cloud Architecture
    Li, Weixian
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 498 - 502