Detecting anomalous access patterns in relational databases

被引:92
|
作者
Kamra, Ashish [1 ,2 ]
Terzi, Evimaria [3 ,4 ]
Bertino, Elisa [1 ,2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] CERIAS, W Lafayette, IN USA
[3] Univ Helsinki, Helsinki, Finland
[4] HIIT, Helsinki, Finland
来源
VLDB JOURNAL | 2008年 / 17卷 / 05期
基金
美国国家科学基金会;
关键词
anomaly detection; intrusion detection; user profiles; DBMS; RBAC;
D O I
10.1007/s00778-007-0051-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance and security. An important component of any strong security solution is represented by Intrusion Detection (ID) techniques, able to detect anomalous behavior of applications and users. To date, however, there have been few ID mechanisms proposed which are specifically tailored to function within the DBMS. In this paper, we propose such a mechanism. Our approach is based on mining SQL queries stored in database audit log files. The result of the mining process is used to form profiles that can model normal database access behavior and identify intruders. We consider two different scenarios while addressing the problem. In the first case, we assume that the database has a Role Based Access Control (RBAC) model in place. Under a RBAC system permissions are associated with roles, grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals while holding a specific role, behave differently than expected. An important advantage of providing an ID technique specifically tailored to RBAC databases is that it can help in protecting against insider threats. Furthermore, the existence of roles makes our approach usable even for databases with large user population. In the second scenario, we assume that there are no roles associated with users of the database. In this case, we look directly at the behavior of the users. We employ clustering algorithms to form concise profiles representing normal user behavior. For detection, we either use these clustered profiles as the roles or employ outlier detection techniques to identify behavior that deviates from the profiles. Our preliminary experimental evaluation on both real and synthetic database traces shows that our methods work well in practical situations.
引用
收藏
页码:1063 / 1077
页数:15
相关论文
共 50 条
  • [1] Detecting anomalous access patterns in relational databases
    Ashish Kamra
    Evimaria Terzi
    Elisa Bertino
    [J]. The VLDB Journal, 2008, 17 : 1063 - 1077
  • [2] Detecting Implicit Meta-Patterns in Relational Databases
    Buckley, James P.
    Seitzer, Jennifer M.
    [J]. IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL I (POST-CONFERENCE EDITION), 2010, : 162 - 164
  • [3] Random Forests with Weighted Voting for Anomalous Query Access Detection in Relational Databases
    Ronao, Charissa Ann
    Cho, Sung-Bae
    [J]. ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, PT II (ICAISC 2015), 2015, 9120 : 36 - 48
  • [4] ON ESTIMATING ACCESS COSTS IN RELATIONAL DATABASES
    MAIO, D
    SCALAS, MR
    TIBERIO, P
    [J]. INFORMATION PROCESSING LETTERS, 1984, 19 (03) : 157 - 161
  • [5] CONCEPTUAL DESIGN PATTERNS FOR RELATIONAL DATABASES
    Vitacolonna, Nicola
    [J]. INFORMATION TECHNOLOGIES' 2011, 2011, : 239 - 246
  • [6] Processing sequential patterns in relational databases
    Shang, XQ
    Sattler, KU
    [J]. DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2005, 3589 : 438 - 447
  • [7] THE DESIGN OF OPTIMAL ACCESS PATHS FOR RELATIONAL DATABASES
    MOTZKIN, D
    [J]. INFORMATION SYSTEMS, 1987, 12 (02) : 203 - 213
  • [8] A tool for access to relational databases in natural language
    Papadakis, Nikos
    Kefalas, Pavlos
    Stilianakakis, Manolis
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) : 7894 - 7900
  • [9] Discovering relational patterns across multiple databases
    Zhu, Xingquan
    Wu, Xindong
    [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 701 - +
  • [10] Modeling and Detecting Anomalous Topic Access
    Gupta, Siddharth
    Hanson, Casey
    Gunter, Carl A.
    Frank, Mario
    Liebovitz, David
    Malin, Bradley
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 100 - 105