A semantic approach to frequency based anomaly detection of insider access in database management systems

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Timely detection of an insider attack is prevalent among challenges in database security. Research on anomaly-based database intrusion detection systems has received significant attention because of its potential to detect zero-day insider attacks. Such approaches differ mainly in their construction of normative behavior of (insider) role/user. In this paper, a different perspective on the construction of normative behavior is presented, whereby normative behavior is captured instead from the perspective of the DBMS itself. Using techniques from Statistical Process Control, a model of DBMS-oriented normal behavior is described that can be used to detect frequency based anomalies in database access. The approach is evaluated using a synthetic dataset and we also demonstrate this DBMS-oriented profile can be transformed into the more traditional role-oriented profiles.

Original languageEnglish
Title of host publicationRisks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Revised Selected Papers
EditorsNora Cuppens, Frederic Cuppens, Axel Legay, Jean-Louis Lanet, Joaquin Garcia-Alfaro
PublisherSpringer Verlag
Pages18-28
Number of pages11
ISBN (Print)9783319766867
DOIs
Publication statusPublished - 2018
Event12th International Conference on Risks and Security of Internet and Systems, CRiSIS 2017 - Dinard, France
Duration: 19 Sep 201721 Sep 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10694 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on Risks and Security of Internet and Systems, CRiSIS 2017
Country/TerritoryFrance
CityDinard
Period19/09/1721/09/17

Keywords

  • Anomaly detection
  • Cybersecurity
  • Database intrusion detection
  • Insider threats

Fingerprint

Dive into the research topics of 'A semantic approach to frequency based anomaly detection of insider access in database management systems'. Together they form a unique fingerprint.

Cite this