Detecting anomalous access patterns in relational databases

被引:0
|
作者
Ashish Kamra
Evimaria Terzi
Elisa Bertino
机构
[1] Purdue University and CERIAS,
[2] University of Helsinki and HIIT,undefined
来源
The VLDB Journal | 2008年 / 17卷
关键词
Anomaly detection; Intrusion detection; User profiles; DBMS; RBAC;
D O I
暂无
中图分类号
学科分类号
摘要
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance and security. An important component of any strong security solution is represented by Intrusion Detection (ID) techniques, able to detect anomalous behavior of applications and users. To date, however, there have been few ID mechanisms proposed which are specifically tailored to function within the DBMS. In this paper, we propose such a mechanism. Our approach is based on mining SQL queries stored in database audit log files. The result of the mining process is used to form profiles that can model normal database access behavior and identify intruders. We consider two different scenarios while addressing the problem. In the first case, we assume that the database has a Role Based Access Control (RBAC) model in place. Under a RBAC system permissions are associated with roles, grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals while holding a specific role, behave differently than expected. An important advantage of providing an ID technique specifically tailored to RBAC databases is that it can help in protecting against insider threats. Furthermore, the existence of roles makes our approach usable even for databases with large user population. In the second scenario, we assume that there are no roles associated with users of the database. In this case, we look directly at the behavior of the users. We employ clustering algorithms to form concise profiles representing normal user behavior. For detection, we either use these clustered profiles as the roles or employ outlier detection techniques to identify behavior that deviates from the profiles. Our preliminary experimental evaluation on both real and synthetic database traces shows that our methods work well in practical situations.
引用
收藏
页码:1063 / 1077
页数:14
相关论文
共 50 条
  • [22] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [23] Use of relational databases to improve Web access to climate information
    Collins, JA
    Ray, A
    14TH INTERNATIONAL CONFERENCE ON INTERACTIVE INFORMATION AND PROCESSING SYSTEM (IIPS) FOR METEOROLOGY, OCEANOGRAPHY, AND HYDROLOGY, 1998, : 413 - 416
  • [24] A fine-grained access control model for relational databases
    Jie Shi
    Hong Zhu
    Journal of Zhejiang University SCIENCE C, 2010, 11 : 575 - 586
  • [25] Mandatory and Location-Aware Access Control for Relational Databases
    Decker, Michael
    COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 217 - 228
  • [26] Selection of Access Method for a Set of Table Records in a Relational Databases
    Baranchikov, Aleksey, I
    Baranchikov, Pavel A.
    Babaev, Sergey, I
    Tarasov, Andrey S.
    13TH INTERNATIONAL CONFERENCE ON ELEKTRO (ELEKTRO 2020), 2020,
  • [27] A fine-grained access control model for relational databases
    Shi, Jie
    Zhu, Hong
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (08): : 575 - 586
  • [28] A fine-grained access control model for relational databases
    Jie SHIHong ZHU College of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan China
    Journal of Zhejiang University-Science C(Computers & Electronics), 2010, 11 (08) : 575 - 586
  • [29] Detecting content changes on ordered XML documents using relational databases
    Leonardi, E
    Bhowmick, SS
    Dharma, TS
    Madria, S
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 580 - 590
  • [30] Concurrent Access Performance Comparison Between Relational Databases and Graph NoSQL Databases for Complex Algorithms
    Lupu, Elena
    Olteanu, Adriana
    Ionita, Anca Daniela
    APPLIED SCIENCES-BASEL, 2024, 14 (21):