首页> 外文会议>Secure data management >Database Intrusion Detection Using Role Profiling with Role Hierarchy
【24h】

Database Intrusion Detection Using Role Profiling with Role Hierarchy

机译:使用带有角色层次结构的角色剖析的数据库入侵检测

获取原文
获取原文并翻译 | 示例

摘要

Insider threats cause the majority of computer system security problems. An anomaly-based intrusion detection system (IDS), which can profile normal behaviors for all users and detect anomalies when a user's behaviors deviate from his/her profiles, can be effective to protect computer systems against insider threats. Although many ID-Ses have been developed at the network or host level, there are still very few IDSes specifically tailored to database systems. We build our anomaly-based database IDS using two different profiling methods: one is to build profiles for each individual user (user profiling) and the other is to mine profiles for roles (role profiling) when role-based access control (RBAC) is supported by the database management system (DBMS). Detailed comparative evaluations between role profiling and user profiling are conducted, and we also analyze the reasons why role profiling is more effective and efficient than user profiling. Another contribution of our work is that we introduce role hierarchies into database IDS and remarkably reduce the false positive rate without increasing the false negative rate.
机译:内部威胁会导致大多数计算机系统安全问题。基于异常的入侵检测系统(IDS)可以有效地保护所有用户的正常行为,并在用户的行为偏离其配置文件时检测异常,从而可以有效地保护计算机系统免受内部威胁。尽管已经在网络或主机级别开发了许多ID-S,但是仍然很少有专门针对数据库系统定制的IDS。我们使用两种不同的概要分析方法来构建基于异常的数据库IDS:一种是为每个用户构建概要文件(用户概要分析),另一种是在基于角色的访问控制(RBAC)被使用时为角色挖掘概要文件(角色概要分析)。由数据库管理系统(DBMS)支持。进行了角色配置和用户配置之间的详细比较评估,并且我们还分析了角色配置比用户配置更有效的原因。我们工作的另一个贡献是,我们将角色层次结构引入了数据库IDS,并显着减少了误报率,而没有增加误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号