首页> 外文学位 >Data profiling and the access path model: A step toward addressing insider misuse in database systems.
【24h】

Data profiling and the access path model: A step toward addressing insider misuse in database systems.

机译:数据分析和访问路径模型:迈向解决数据库系统内部滥用的一步。

获取原文
获取原文并翻译 | 示例

摘要

In recent years, there has been a significant increase in the use of complex information infrastructures by government, industry, military, and academia. The users of these infrastructures depend heavily on the availability, confidentiality, and accuracy of the information. Despite many advances in intrusion detection systems (IDS), insider misuse, in which the malicious behavior (intentional or accidental) comes from within a system, such as the operating system or a database system, is difficult to detect using IDS. This leaves the mission critical data managed in a database vulnerable to misuse.; The problem of insider misuse is complex and non-trivial. The models and techniques presented in this dissertation take a step toward addressing this problem. The approach is "data-centric" as it focuses on protecting the mission critical data from insider misuse. This approach facilitates the enforcement of information integrity principles of least privilege and accountability. The two major aspects of the approach presented include data profiling framework to describe the data behavior and the access path model to describe access paths to this data from database users, application users, and operating system users. The access path model is enriched further to include profile information regarding the data, their users, and their access correlations. Focusing on relational database systems, a methodology is presented for data profiling based on the observed data values and data accesses over a period of time. Finally, the access path model and the data profiles are used to derive a fine-grained access policy, which forms the basis for preventing, deterring, and detecting insider misuse.
机译:近年来,政府,工业界,军事界和学术界对复杂信息基础架构的使用已大大增加。这些基础架构的用户在很大程度上取决于信息的可用性,机密性和准确性。尽管入侵检测系统(IDS)取得了许多进步,但是内部人员滥用(其中恶意行为(故意或偶然)来自系统(例如操作系统或数据库系统)的内部行为)很难使用IDS进行检测。这使得数据库中管理的关键任务数据容易被滥用。内部人滥用问题是复杂且不平凡的。本文提出的模型和技术朝着解决这个问题迈出了一步。该方法是“以数据为中心”的,因为它致力于保护关键任务数据免受内部人员的滥用。这种方法促进了最低特权和问责制的信息完整性原则的实施。提出的方法的两个主要方面包括描述数据行为的数据概要分析框架和描述数据库用户,应用程序用户和操作系统用户对此数据的访问路径的访问路径模型。访问路径模型进一步丰富,以包括有关数据,其用户及其访问相关性的配置文件信息。着眼于关系数据库系统,提出了一种基于一段时间内观察到的数据值和数据访问的数据概要分析方法。最后,使用访问路径模型和数据配置文件来导出细粒度的访问策略,该策略构成了防止,阻止和检测内部人员滥用的基础。

著录项

  • 作者

    Gandhi, Madhavi.;

  • 作者单位

    University of California, Davis.;

  • 授予单位 University of California, Davis.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2005
  • 页码 151 p.
  • 总页数 151
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号