首页> 外文会议>Information systems security >Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders
【24h】

Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders

机译:自动识别数据库中的关键数据项以减轻恶意内部人员的影响

获取原文
获取原文并翻译 | 示例

摘要

A major concern for computer system security is the threat from malicious insiders who target and abuse critical data items in the system. In this paper, we propose a solution to enable automatic identification of critical data items in a database by way of data dependency relationships. This identification of critical data items is necessary because insider threats often target mission critical data in order to accomplish malicious tasks. Unfortunately, currently available systems fail to address this problem in a comprehensive manner. It is more difficult for non-experts to identify these critical data items because of their lack of familiarity and due to the fact that data systems are constantly changing. By identifying the critical data items automatically, security engineers will be better prepared to protect what is critical to the mission of the organization and also have the ability to focus their security efforts on these critical data items. We have developed an algorithm that scans the database logs and forms a directed graph showing which items influence a large number of other items and at what frequency this influence occurs. This graph is traversed to reveal the data items which have a large influence throughout the database system by using a novel metric based formula. These items are critical to the system because if they are maliciously altered or stolen, the malicious alterations will spread throughout the system, delaying recovery and causing a much more malignant effect. As these items have significant influence, they are deemed to be critical and worthy of extra security measures. Our proposal is not intended to replace existing intrusion detection systems, but rather is intended to complement current and future technologies. Our proposal has never been performed before, and our experimental results have shown that it is very effective in revealing critical data items automatically.
机译:对计算机系统安全性的主要关注是恶意内部人员的威胁,这些内部人员以系统中的关键数据项目为目标并对其进行滥用。在本文中,我们提出了一种解决方案,以通过数据依赖关系自动识别数据库中的关键数据项。关键数据项的这种识别是必要的,因为内部威胁通常以任务关键数据为目标,以完成恶意任务。不幸的是,当前可用的系统无法全面解决该问题。由于缺乏专业知识以及数据系统不断变化,非专家很难识别这些关键数据项。通过自动识别关键数据项,安全工程师将做好更好的准备,以保护对组织任务至关重要的事物,并且还能够将安全工作集中在这些关键数据项上。我们已经开发了一种算法,该算法可以扫描数据库日志并形成有向图,以显示哪些项目影响大量其他项目以及这种影响发生的频率。通过使用一种新颖的基于度量的公式,可以遍历此图以显示对整个数据库系统有很大影响的数据项。这些项目对系统至关重要,因为如果它们被恶意更改或被盗,恶意更改将在整个系统中传播,从而延误恢复并造成更加严重的后果。由于这些项目具有重大影响,因此被认为是至关重要的,值得采取额外的安全措施。我们的建议不是要取代现有的入侵检测系统,而是要补充当前和将来的技术。我们的建议从未执行过,我们的实验结果表明它在自动显示关键数据项方面非常有效。

著录项

  • 来源
    《Information systems security》|2009年|P.208-221|共14页
  • 会议地点 Kolkata(IN);Kolkata(IN)
  • 作者单位

    Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, 72703, USA;

    rnDepartment of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas, 72703, USA;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 计算机网络;安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号