Detecting anomalous access patterns in relational databases

被引:0
|
作者
Ashish Kamra
Evimaria Terzi
Elisa Bertino
机构
[1] Purdue University and CERIAS,
[2] University of Helsinki and HIIT,undefined
来源
The VLDB Journal | 2008年 / 17卷
关键词
Anomaly detection; Intrusion detection; User profiles; DBMS; RBAC;
D O I
暂无
中图分类号
学科分类号
摘要
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance and security. An important component of any strong security solution is represented by Intrusion Detection (ID) techniques, able to detect anomalous behavior of applications and users. To date, however, there have been few ID mechanisms proposed which are specifically tailored to function within the DBMS. In this paper, we propose such a mechanism. Our approach is based on mining SQL queries stored in database audit log files. The result of the mining process is used to form profiles that can model normal database access behavior and identify intruders. We consider two different scenarios while addressing the problem. In the first case, we assume that the database has a Role Based Access Control (RBAC) model in place. Under a RBAC system permissions are associated with roles, grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals while holding a specific role, behave differently than expected. An important advantage of providing an ID technique specifically tailored to RBAC databases is that it can help in protecting against insider threats. Furthermore, the existence of roles makes our approach usable even for databases with large user population. In the second scenario, we assume that there are no roles associated with users of the database. In this case, we look directly at the behavior of the users. We employ clustering algorithms to form concise profiles representing normal user behavior. For detection, we either use these clustered profiles as the roles or employ outlier detection techniques to identify behavior that deviates from the profiles. Our preliminary experimental evaluation on both real and synthetic database traces shows that our methods work well in practical situations.
引用
收藏
页码:1063 / 1077
页数:14
相关论文
共 50 条
  • [31] Converting Relational Databases into Object-relational Databases
    Maatuk, Abdelsalam
    Ali, M. Akhtar
    Rossiter, Nick
    JOURNAL OF OBJECT TECHNOLOGY, 2010, 9 (02): : 145 - 161
  • [32] RELATIONAL DATABASES
    STOUT, QF
    WOODWORTH, PA
    AMERICAN MATHEMATICAL MONTHLY, 1983, 90 (02): : 101 - 118
  • [33] RELATIONAL DATABASES
    BAKER, HG
    COMMUNICATIONS OF THE ACM, 1992, 35 (04) : 16 - &
  • [34] Efficiently Supporting Attribute-Based Access Control in Relational Databases
    Meena, Gaurav
    Paul, Proteet
    Sural, Shamik
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
  • [35] Top-k retrieval for ontology mediated access to relational databases
    Straccia, Umberto
    INFORMATION SCIENCES, 2012, 198 : 1 - 23
  • [36] DBMask: Fine-Grained Access Control on Encrypted Relational Databases
    Sarfraz, Muhammad I.
    Nabeel, Mohamed
    Cao, Jianneng
    Bertino, Elisa
    TRANSACTIONS ON DATA PRIVACY, 2016, 9 (03) : 187 - 214
  • [37] OBSERVATION-BASED FINE GRAINED ACCESS CONTROL FOR RELATIONAL DATABASES
    Halder, Raju
    Cortesi, Agostino
    ICSOFT 2010: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, 2010, : 254 - 265
  • [38] Controlling Access to XML Documents over XML Native and Relational Databases
    Koromilas, Lazaros
    Chinis, George
    Fundulaki, Irini
    Ioannidis, Sotiris
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 122 - 141
  • [39] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [40] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +