A white-box anomaly-based framework for database leakage detection

被引:17
|
作者
Costante, E. [1 ]
den Hartog, J. [1 ]
Petkovic, Milan [1 ,2 ]
Etalle, S. [1 ,3 ]
Pechenizkiy, M. [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[2] Philips Res Europe, High Tech Campus, Eindhoven, Netherlands
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
Data leakage; Insider threats; Database monitoring; Database intrusion detection;
D O I
10.1016/j.jisa.2016.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data leakage is at the heart most of the privacy breaches worldwide. In this paper we present a white-box approach to detect potential data leakage by spotting anomalies in database transactions. We refer to our solution as white-box because it builds self explanatory profiles that are easy to understand and update, as opposite to black-box systems which create profiles hard to interpret and maintain (e.g., neural networks). In this paper we introduce our approach and we demonstrate that it is a major leap forward w.r.t. previous work on the topic in several aspects: (i) it significantly decreases the number of false positives, which is orders of magnitude lower than in state-of-the-art comparable approaches (we demonstrate this using an experimental dataset consisting of millions of real enterprise transactions); (ii) it creates profiles that are easy to understand and update, and therefore it provides an explanation of the origins of an anomaly; (iii) it allows the introduction of a feedback mechanism that makes possible for the system to improve based on its own mistakes; and (iv) feature aggregation and transaction flow analysis allow the system to detect threats which span over multiple features and multiple transactions. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:27 / 46
页数:20
相关论文
共 50 条
  • [21] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [22] Cryptanalysis of ARX-based White-box Implementations
    Biryukov A.
    Lambin B.
    Udovenko A.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (03): : 97 - 135
  • [23] Evolutionary white-box software test with the EvoTest Framework, a progress report
    Gross, Hamilton
    Kruse, Peter M.
    Wegener, Joachim
    Vos, Tanja
    ICSTW 2009: IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION, AND VALIDATION WORKSHOPS, 2009, : 111 - +
  • [24] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [25] White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
    Erba, Alessandro
    Tippenhauer, Nils Ole
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 111 - 131
  • [26] Anomaly-based fault detection system in distributed system
    Kim, Byoung uk
    Hariri, Salim
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 782 - +
  • [27] An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures
    Almaraz-Rivera, Josue Genaro
    IEEE LATIN AMERICA TRANSACTIONS, 2023, 21 (03) : 457 - 465
  • [28] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] Design of an Anomaly-based Threat Detection & Explication System
    Luh, Robert
    Schrittwieser, Sebastian
    Marschalek, Stefan
    Janicke, Helge
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 397 - 402
  • [30] Anomaly-Based Annotation Errors Detection in TTS Corpora
    Matousek, Jindrich
    Tihelka, Daniel
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 314 - +