Predicting and Preventing Insider Threat in Relational Database Systems

被引:0
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Relational Database; Security; Insider Threat; Dependencies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.
引用
收藏
页码:368 / 383
页数:16
相关论文
共 50 条
  • [21] INTEGRATED SYSTEMS APPROACH TO MEET THE INSIDER THREAT.
    Barnes, Lawrence D.
    Nuclear materials management, 1985, 14 (03): : 628 - 632
  • [22] Insider threat detection within embedded weapon systems
    Haan, Nicholas
    Grimaila, Michael
    Patel, Raju
    3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 163 - +
  • [23] Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication
    Brown, Christopher R.
    Watkins, Alison
    Greitzer, Frank L.
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1849 - 1858
  • [24] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [25] The insider threat ‘zoo’
    Renaud K.
    Warkentin M.
    Computer Fraud and Security, 2024, 2024 (05):
  • [27] Addressing the insider threat
    Application Security Inc
    Netw. Secur., 2008, 3 (11-14):
  • [28] Integrating constraint and relational database systems
    Cai, MC
    CONSTRAINT DATABASES, PROCEEDINGS, 2004, 3074 : 173 - 180
  • [29] Reflections on the insider threat
    Pfleeger, Charles P.
    INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
  • [30] Integrating XML and Relational Database Systems
    Gerti Kappel
    Elisabeth Kapsammer
    Werner Retschitzegger
    World Wide Web, 2004, 7 : 343 - 384