Predicting and Preventing Insider Threat in Relational Database Systems

被引:0
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Relational Database; Security; Insider Threat; Dependencies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.
引用
收藏
页码:368 / 383
页数:16
相关论文
共 50 条
  • [1] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases
    Chagarlamudi, Manideep
    Panda, Brajendra
    Hu, Yi
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1616 - +
  • [2] Tackling Insider Threat in Cloud Relational Databases
    Yaseen, Qussai
    Panda, Brajendra
    2012 IEEE/ACM FIFTH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2012), 2012, : 215 - 218
  • [3] Mitigating insider threat in cloud relational databases
    Yaseen, Qussai
    Althebyan, Qutaibah
    Panda, Brajendra
    Jararweh, Yaser
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1132 - 1145
  • [4] Scalable predicting model for insider threat
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Xuebao, 2006, 8 (1346-1355):
  • [5] Insider threat mitigation: preventing unauthorized knowledge acquisition
    Yaseen, Qussai
    Panda, Brajendra
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (04) : 269 - 280
  • [6] Insider threat mitigation: preventing unauthorized knowledge acquisition
    Qussai Yaseen
    Brajendra Panda
    International Journal of Information Security, 2012, 11 : 269 - 280
  • [7] A Model-Based Approach to Predicting the Performance of Insider Threat Detection Systems
    Roberts, Shannon C.
    Holodnak, John T.
    Trang Nguyen
    Yuditskaya, Sophia
    Milosavljevic, Maja
    Streilein, William W.
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 314 - 323
  • [8] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    Cluster Computing, 2017, 20 : 2669 - 2685
  • [9] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [10] Database Intrusion Detection: Protecting Against the Insider Threat
    Barton, Kevin A.
    Jeffries-Horner, Carol J.
    AMCIS 2012 PROCEEDINGS, 2012,