A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks

被引:0
|
作者
Moon, Cheolmin Sky [1 ]
Chung, Sam [1 ,2 ]
Endicott-Popovsky, Barbara [2 ]
机构
[1] Univ Washington, Inst Technol, Comp Sci & Syst, Tacoma, WA USA
[2] Univ Washington, Ctr Informat Assurance & Cybersecur, Seattle, WA 98195 USA
关键词
Insider attacks; Database audit logs; File system audit logs; Monitoring; Cloud computing; In-memory database;
D O I
10.1007/978-3-319-05149-9_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a response of emerging insider attacks targeting on database, we are proposing architecture of database protection system from insider attacks. Existing pattern matching approach to detect insider attacks cannot provide perfect solution because of false positive and true negative ratios. Accordingly, we still need reasoning by a human at the last decision to declare that the insider is malicious or not using analysis on history of transaction logs performed by the insider. To construct a system with the consideration above, the system needs to satisfy following requirements: (1) effective monitoring and analysis on large amount of log data (2) scalable system depending on increase or decrease of the log data, and (3) prompt analysis even though the amount of the log data is large enough. We propose a two-tier, distributed, cloud, and in-memory computing based architecture. The proposed architecture brings several benefits such as managing a large amount of log data, distributing analysis workload over multiple nodes, being scalable on big log data, and supporting real-time analysis of big log data.
引用
收藏
页码:260 / 271
页数:12
相关论文
共 50 条
  • [41] A two-tier multi-objective service placement in container-based fog-cloud computing platforms
    Dogani, Javad
    Yazdanpanah, Ali
    Zare, Arash
    Khunjush, Farshad
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4491 - 4514
  • [42] RLTiering: A Cost-Driven Auto-Tiering System for Two-Tier Cloud Storage Using Deep Reinforcement Learning
    Liu, Mingyu
    Pan, Li
    Liu, Shijun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (02) : 73 - 90
  • [43] Performance research on a task offloading strategy in a two-tier edge structure-based MEC system
    Hao Zhao
    Jingwei Geng
    Shunfu Jin
    The Journal of Supercomputing, 2023, 79 : 10139 - 10177
  • [44] Performance research on a task offloading strategy in a two-tier edge structure-based MEC system
    Zhao, Hao
    Geng, Jingwei
    Jin, Shunfu
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (09): : 10139 - 10177
  • [45] SIR-based uplink admission scheme for a two-tier CDMA system under mobility incorporation
    Khalifa, F.
    Kishk, S.
    Zaki, F. W.
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 353 - 358
  • [46] CNN-based anti-spoofing two-tier multi-factor authentication system
    Sajjad, Muhammad
    Khan, Salman
    Hussain, Tanveer
    Muhammad, Khan
    Sangaiah, Arun Kumar
    Castiglione, Aniello
    Esposito, Christian
    Baik, Sung Wook
    PATTERN RECOGNITION LETTERS, 2019, 126 : 123 - 131
  • [47] Dynamic power allocation based on second-order control system in two-tier femtocell networks
    Yuan, Yazhou
    Liu, Zhixin
    Wang, Jinle
    Guan, Xinping
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 940 - 954
  • [48] Dynamic power allocation based on second-order control system in two-tier femtocell networks
    Yazhou Yuan
    Zhixin Liu
    Jinle Wang
    Xinping Guan
    Peer-to-Peer Networking and Applications, 2018, 11 : 940 - 954
  • [49] Expression of human WFDC2 protein from patients with serous carcinomas by the two-tier system
    Zhu Ya-fei
    Gao Guo-lan
    Zhang Zhen-dong
    Huang Qing-shui
    CHINESE MEDICAL JOURNAL, 2013, 126 (18) : 3576 - 3577
  • [50] Warning Time Analysis From SEP Simulations of a Two-Tier REleASE System Applied to Mars Exploration
    Posner, A.
    Strauss, R. D.
    SPACE WEATHER-THE INTERNATIONAL JOURNAL OF RESEARCH AND APPLICATIONS, 2020, 18 (04):