A white-box anomaly-based framework for database leakage detection

被引:17
|
作者
Costante, E. [1 ]
den Hartog, J. [1 ]
Petkovic, Milan [1 ,2 ]
Etalle, S. [1 ,3 ]
Pechenizkiy, M. [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[2] Philips Res Europe, High Tech Campus, Eindhoven, Netherlands
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
Data leakage; Insider threats; Database monitoring; Database intrusion detection;
D O I
10.1016/j.jisa.2016.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data leakage is at the heart most of the privacy breaches worldwide. In this paper we present a white-box approach to detect potential data leakage by spotting anomalies in database transactions. We refer to our solution as white-box because it builds self explanatory profiles that are easy to understand and update, as opposite to black-box systems which create profiles hard to interpret and maintain (e.g., neural networks). In this paper we introduce our approach and we demonstrate that it is a major leap forward w.r.t. previous work on the topic in several aspects: (i) it significantly decreases the number of false positives, which is orders of magnitude lower than in state-of-the-art comparable approaches (we demonstrate this using an experimental dataset consisting of millions of real enterprise transactions); (ii) it creates profiles that are easy to understand and update, and therefore it provides an explanation of the origins of an anomaly; (iii) it allows the introduction of a feedback mechanism that makes possible for the system to improve based on its own mistakes; and (iv) feature aggregation and transaction flow analysis allow the system to detect threats which span over multiple features and multiple transactions. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:27 / 46
页数:20
相关论文
共 50 条
  • [1] Hunting the Unknown White-Box Database Leakage Detection
    Costante, Elisa
    den Hartog, Jerry
    Petkovic, Milan
    Etalle, Sandro
    Pechenizkiy, Mykola
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 243 - 259
  • [2] A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control
    Leite, Cristoffer
    den Hartog, Jerry
    Koster, Paul
    PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 7 - 18
  • [3] Practical and White-Box Anomaly Detection through Unsupervised and Active Learning
    Wang, Yao
    Wang, Zhaowei
    Xie, Zejun
    Zhao, Nengwen
    Chen, Junjie
    Zhang, Wenchi
    Sui, Kaixin
    Pei, Dan
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [4] A systematic evaluation of white-box explainable AI methods for anomaly detection in IoT systems
    Gummadi, Anna N.
    Arreche, Osvaldo
    Abdallah, Mustafa
    INTERNET OF THINGS, 2025, 30
  • [5] Automatic generation of database instances for white-box testing
    Zhang, B
    Xu, C
    Cheung, SC
    25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 2001, : 161 - 165
  • [6] Database instances Generation Tool for White-box Testing
    Shelar, Samidha
    Sawarkar, S. D.
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING, 2009, : 112 - +
  • [7] Defending Deep Learning Based Anomaly Detection Systems Against White-Box Adversarial Examples and Backdoor Attacks
    Alrawashdeh, Khaled
    Goldsmith, Stephen
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS), 2021, : 294 - 301
  • [8] A White-Box Sociolinguistic Model for Gender Detection
    Morales Sanchez, Damian
    Moreno, Antonio
    Jimenez Lopez, Maria Dolores
    APPLIED SCIENCES-BASEL, 2022, 12 (05):
  • [9] Collaborative anomaly-based attack detection
    Gamer, Thomas
    Scharf, Michael
    Schoeller, Marcus
    SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2007, 4725 : 280 - +
  • [10] An algorithm for anomaly-based botnet detection
    Binkley, James R.
    Singh, Suresh
    USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 43 - +