A white-box anomaly-based framework for database leakage detection

被引:17
|
作者
Costante, E. [1 ]
den Hartog, J. [1 ]
Petkovic, Milan [1 ,2 ]
Etalle, S. [1 ,3 ]
Pechenizkiy, M. [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[2] Philips Res Europe, High Tech Campus, Eindhoven, Netherlands
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
Data leakage; Insider threats; Database monitoring; Database intrusion detection;
D O I
10.1016/j.jisa.2016.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data leakage is at the heart most of the privacy breaches worldwide. In this paper we present a white-box approach to detect potential data leakage by spotting anomalies in database transactions. We refer to our solution as white-box because it builds self explanatory profiles that are easy to understand and update, as opposite to black-box systems which create profiles hard to interpret and maintain (e.g., neural networks). In this paper we introduce our approach and we demonstrate that it is a major leap forward w.r.t. previous work on the topic in several aspects: (i) it significantly decreases the number of false positives, which is orders of magnitude lower than in state-of-the-art comparable approaches (we demonstrate this using an experimental dataset consisting of millions of real enterprise transactions); (ii) it creates profiles that are easy to understand and update, and therefore it provides an explanation of the origins of an anomaly; (iii) it allows the introduction of a feedback mechanism that makes possible for the system to improve based on its own mistakes; and (iv) feature aggregation and transaction flow analysis allow the system to detect threats which span over multiple features and multiple transactions. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:27 / 46
页数:20
相关论文
共 50 条
  • [31] A transparent and scalable anomaly-based DoS detection method
    Joldzic, Ognjen
    Djuric, Zoran
    Vuletic, Pavle
    COMPUTER NETWORKS, 2016, 104 : 27 - 42
  • [32] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [33] Anomaly-based intrusion detection using Bayesian networks
    Tylman, Wojciech
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 211 - +
  • [34] SCADA Networks Anomaly-based Intrusion Detection System
    Almehmadi, Abdulaziz
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [35] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [36] Anomaly-based Intrusion Detection System for smart lighting
    Lara, Agustin
    Estepa, Antonio
    Estepa, Rafael
    Diaz-Verdejo, Jesus E.
    Mayor, Vicente
    INTERNET OF THINGS, 2024, 28
  • [37] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [38] An Anomaly-Based IDS Framework Using Centroid-Based Classification
    Lin, Iuon-Chang
    Chang, Ching-Chun
    Peng, Chih-Hsiang
    SYMMETRY-BASEL, 2022, 14 (01):
  • [39] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [40] Anomaly-based intrusion detection system for IoT application
    Bhavsar M.
    Roy K.
    Kelly J.
    Olusola O.
    Discover Internet of Things, 2023, 3 (01):