Predicting and Preventing Insider Threat in Relational Database Systems

被引:0
|
作者
Yaseen, Qussai [1 ]
Panda, Brajendra [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
关键词
Relational Database; Security; Insider Threat; Dependencies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.
引用
收藏
页码:368 / 383
页数:16
相关论文
共 50 条
  • [41] MORE ON RELATIONAL DATABASE-SYSTEMS
    BRENNAN, PJ
    COMMUNICATIONS OF THE ACM, 1992, 35 (08) : 14 - 14
  • [42] Copyright Protection of Relational Database Systems
    Al-Haj, Ali
    Odeh, Ashraf
    Masadeh, Shadi
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 143 - +
  • [43] The insider threat to information systems and the effectiveness of ISO17799
    Theoharidou, M
    Kokolakis, S
    Karyda, M
    Kiountouzis, E
    COMPUTERS & SECURITY, 2005, 24 (06) : 472 - 484
  • [44] False data injection attacks and the insider threat in smart systems
    Gonen, Serkan
    Sayan, H. Huseyin
    Yilmaz, Ercan Nurcan
    Ustunsoy, Furkan
    Karacayilmaz, Gokce
    COMPUTERS & SECURITY, 2020, 97
  • [45] Implementing Multi-relational Mining with Relational Database Systems
    Inuzuka, Nobuhiro
    Makino, Toshiyuki
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II, PROCEEDINGS, 2009, 5712 : 672 - 680
  • [46] Insider threat detection for specific threat scenarios
    Tian, Tian
    Zhang, Chen
    Jiang, Bo
    Feng, Huamin
    Lu, Zhigang
    CYBERSECURITY, 2025, 8 (01):
  • [48] The influence of insider law on preventing insider information leakage
    Li, Guangshuai
    Bi, Ying
    Metallurgical and Mining Industry, 2015, 7 (09): : 446 - 451
  • [49] Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 135 - 142
  • [50] The Insider Threat in Cloud Computing
    Kandias, Miltiadis
    Virvilis, Nikos
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103