【24h】

Detection of Insiders Misuse in Database Systems

机译:检测数据库系统中的内部人滥用

获取原文

摘要

Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks are those that come from outside the system, however, insider attacks are those that are launched from insiders of the system. In this paper we concentrate on insider attacks detection on the application level; database is our focus. Insider attacks differ from outsider attacks in many ways; most importantly, insiders have more knowledge about the underlying systems. Because of their knowledge and their privileges of the system resources; their risk can be greater and more severe. In fact, insiders can find vulnerabilities in the system easily. Several techniques have been proposed that tackled the insider threat problem, but most of them concentrate on insider threat detection in computer system level. We describe a method for insider threat detection in database systems that handle entrants on the role of insiders for such attacks. Our simulation results show resistance against such attacks. Also, our results show good performance in terms of reducing false alarms to the minimum.
机译:世界各地的所有系统都遭受局外人和内幕攻击。局外攻击是那些来自系统之外的攻击,然而,内幕攻击是那些从系统内部推出的内幕攻击。在本文中,我们专注于内幕攻击对应用水平的检测;数据库是我们的焦点。内幕攻击在许多方面与局外攻击不同;最重要的是,内部人员对底层系统有更多了解。由于他们的知识及其系统资源的特权;他们的风险可以更大,更严重。事实上,内部人员可以轻松地找到系统中的漏洞。已经提出了几种技术,以解决内幕威胁问题,但大多数集中在计算机系统级别中的内幕威胁检测。我们描述了一种在数据库系统中的内部威胁检测方法,该方法处理了用于这些攻击的内部人的角色的参与者。我们的仿真结果表明抵抗这种攻击。此外,我们的结果在将误报降至最低的情况下表现出良好的性能。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号