Detecting anomalous access patterns in relational databases

被引:0
|
作者
Ashish Kamra
Evimaria Terzi
Elisa Bertino
机构
[1] Purdue University and CERIAS,
[2] University of Helsinki and HIIT,undefined
来源
The VLDB Journal | 2008年 / 17卷
关键词
Anomaly detection; Intrusion detection; User profiles; DBMS; RBAC;
D O I
暂无
中图分类号
学科分类号
摘要
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance and security. An important component of any strong security solution is represented by Intrusion Detection (ID) techniques, able to detect anomalous behavior of applications and users. To date, however, there have been few ID mechanisms proposed which are specifically tailored to function within the DBMS. In this paper, we propose such a mechanism. Our approach is based on mining SQL queries stored in database audit log files. The result of the mining process is used to form profiles that can model normal database access behavior and identify intruders. We consider two different scenarios while addressing the problem. In the first case, we assume that the database has a Role Based Access Control (RBAC) model in place. Under a RBAC system permissions are associated with roles, grouping several users, rather than with single users. Our ID system is able to determine role intruders, that is, individuals while holding a specific role, behave differently than expected. An important advantage of providing an ID technique specifically tailored to RBAC databases is that it can help in protecting against insider threats. Furthermore, the existence of roles makes our approach usable even for databases with large user population. In the second scenario, we assume that there are no roles associated with users of the database. In this case, we look directly at the behavior of the users. We employ clustering algorithms to form concise profiles representing normal user behavior. For detection, we either use these clustered profiles as the roles or employ outlier detection techniques to identify behavior that deviates from the profiles. Our preliminary experimental evaluation on both real and synthetic database traces shows that our methods work well in practical situations.
引用
收藏
页码:1063 / 1077
页数:14
相关论文
共 50 条
  • [41] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [42] Xandy: Detecting changes on large unordered XML documents using relational Databases
    Leonardi, E
    Bhowmick, SS
    Madria, S
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2005, 3453 : 711 - 723
  • [43] An effective approach to mine relational patterns and its extensive analysis on multi-relational databases
    Kumar, D. Vimal
    Tamilarasi, A.
    [J]. INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2013, 5 (03) : 277 - 297
  • [44] Discovering emerging patterns in spatial databases: A multi-relational approach
    Ceci, Michelangelo
    Appice, Annalisa
    Malerba, Donato
    [J]. KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 390 - +
  • [45] On the Potential of Relational Databases for the Detection of Clusters of Infection and Antibiotic Resistance Patterns
    Gelfusa, Michela
    Murari, Andrea
    Ludovici, Gian Marco
    Franchi, Cristiano
    Gelfusa, Claudio
    Malizia, Andrea
    Gaudio, Pasqualino
    Farinelli, Giovanni
    Panella, Giacinto
    Gargiulo, Carla
    Casinelli, Katia
    [J]. ANTIBIOTICS-BASEL, 2023, 12 (04):
  • [46] OBJECT DATABASES AS GENERALIZATIONS OF RELATIONAL DATABASES
    BEECH, D
    OZBUTUN, C
    [J]. COMPUTER STANDARDS & INTERFACES, 1991, 13 (1-3) : 221 - 230
  • [47] Detecting Intruders by User File Access Patterns
    Huang, Shou-Hsuan S.
    Cao, Zechun
    Raines, Calvin E.
    Yang, Mai N.
    Simon, Camille
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335
  • [48] Detecting anomalous spectrum usage in dynamic spectrum access networks
    Liu, Song
    Greenstein, Larry J.
    Trappe, Wade
    Chen, Yingying
    [J]. AD HOC NETWORKS, 2012, 10 (05) : 831 - 844
  • [49] Fine-Grained Access Control in Hybrid Relational-XML Databases
    Sasaki, Taketo
    Fukushima, Takuya
    Park, Daeil
    Toyama, Motomichi
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 611 - +
  • [50] Access-aware In-memory Data Cache Middleware for Relational Databases
    Ma, Kun
    Yang, Bo
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1506 - 1511