A white-box anomaly-based framework for database leakage detection

被引:17
|
作者
Costante, E. [1 ]
den Hartog, J. [1 ]
Petkovic, Milan [1 ,2 ]
Etalle, S. [1 ,3 ]
Pechenizkiy, M. [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[2] Philips Res Europe, High Tech Campus, Eindhoven, Netherlands
[3] Univ Twente, POB 217, NL-7500 AE Enschede, Netherlands
关键词
Data leakage; Insider threats; Database monitoring; Database intrusion detection;
D O I
10.1016/j.jisa.2016.10.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data leakage is at the heart most of the privacy breaches worldwide. In this paper we present a white-box approach to detect potential data leakage by spotting anomalies in database transactions. We refer to our solution as white-box because it builds self explanatory profiles that are easy to understand and update, as opposite to black-box systems which create profiles hard to interpret and maintain (e.g., neural networks). In this paper we introduce our approach and we demonstrate that it is a major leap forward w.r.t. previous work on the topic in several aspects: (i) it significantly decreases the number of false positives, which is orders of magnitude lower than in state-of-the-art comparable approaches (we demonstrate this using an experimental dataset consisting of millions of real enterprise transactions); (ii) it creates profiles that are easy to understand and update, and therefore it provides an explanation of the origins of an anomaly; (iii) it allows the introduction of a feedback mechanism that makes possible for the system to improve based on its own mistakes; and (iv) feature aggregation and transaction flow analysis allow the system to detect threats which span over multiple features and multiple transactions. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:27 / 46
页数:20
相关论文
共 50 条
  • [41] A feature selection-driven machine learning framework for anomaly-based intrusion detection systems
    Emre Emirmahmutoğlu
    Yılmaz Atay
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [42] Remote Heart Rate Estimation in Intense Interference Scenarios: A White-Box Framework
    Liu, Boxiang
    Zheng, Xiujuan
    Wu, Yue Ivan
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 73 : 1 - 1
  • [43] Symbolic Modelling in White-Box Model-Based Testing
    Letichevsky, Alexander
    Letychevskyi, Oleksandr
    Peschanenko, Vladimir
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 237 - 240
  • [44] Diabetes prognosis using white-box machine learning framework for interpretability of results
    Khan, Pathan Faisal
    Meehan, Kevin
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 1501 - 1506
  • [45] A Selective Encryption Algorithm of Video Based on White-box AES
    Kou Xinyu
    Wang Xingjun
    TENTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2018), 2018, 10806
  • [46] White-box Encryption and Link Encryption Mode Based on GPU
    Chen, Hai-Fu
    Su, Qing
    Lai, Wen-Xin
    Chen, Wei-Qi
    Bao, Jiang-Sheng
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 481 - 486
  • [47] Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework
    Junchao Xiao
    Lin Yang
    Fuli Zhong
    Hongbo Chen
    Xiangxue Li
    Applied Intelligence, 2023, 53 : 3183 - 3206
  • [48] Anomaly-Based Intrusion Detection of Protocol-Aware Jamming
    Lichtman, Marc
    Reed, Jeffrey H.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 269 - 274
  • [49] Anomaly-Based Intrusion Detection System for Ad hoc Networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghamri-Doudane, Yacine
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [50] A Genetic Clustering Technique for Anomaly-Based Intrusion Detection Systems
    Aissa, Naila Belhadj
    Guerroumi, Mohamed
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 87 - 92