Detection of Temporal Insider Threats to Relational Databases
Title | Detection of Temporal Insider Threats to Relational Databases |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Sallam, A., Bertino, E. |
Conference Name | 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC) |
Date Published | Oct. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-2565-1 |
Keywords | access anomalies, anomaly detection, composability, Data analysis, data analytics, Data Analytics for Security, data misuse, Data security, feature extraction, Human Behavior, insider threats, legitimate data access, Metrics, Periodicity, pubcrawl, query features, query processing, real-time anomaly detection, Real-time Systems, relational database security, relational databases, resilience, Resiliency, security, security of data, Temporal Attacks, temporal insider threat detection, time series, Training |
Abstract | The mitigation of insider threats against databases is a challenging problem as insiders often have legitimate access privileges to sensitive data. Therefore, conventional security mechanisms, such as authentication and access control, may be insufficient for the protection of databases against insider threats and need to be complemented with techniques that support real-time detection of access anomalies. The existing real-time anomaly detection techniques consider anomalies in references to the database entities and the amounts of accessed data. However, they are unable to track the access frequencies. According to recent security reports, an increase in the access frequency by an insider is an indicator of a potential data misuse and may be the result of malicious intents for stealing or corrupting the data. In this paper, we propose techniques for tracking users' access frequencies and detecting anomalous related activities in real-time. We present detailed algorithms for constructing accurate profiles that describe the access patterns of the database users and for matching subsequent accesses by these users to the profiles. Our methods report and log mismatches as anomalies that may need further investigation. We evaluated our techniques on the OLTP-Benchmark. The results of the evaluation indicate that our techniques are very effective in the detection of anomalies. |
URL | https://ieeexplore.ieee.org/document/8181519 |
DOI | 10.1109/CIC.2017.00058 |
Citation Key | sallam_detection_2017 |
- pubcrawl
- Training
- time series
- temporal insider threat detection
- Temporal Attacks
- security of data
- security
- Resiliency
- resilience
- relational databases
- relational database security
- real-time systems
- real-time anomaly detection
- query processing
- query features
- access anomalies
- Periodicity
- Metrics
- legitimate data access
- Insider Threats
- Human behavior
- feature extraction
- Data Security
- data misuse
- Data Analytics for Security
- Data Analytics
- data analysis
- composability
- Anomaly Detection