Skip to main navigation Skip to search Skip to main content

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches

  • University College Cork
  • Norwegian University of Science and Technology

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information. Database Intrusion detection systems, specifically behaviour-based database intrusion detection systems, have been shown effective in detecting insider attacks. This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses by an insider to Database Management Systems (DBMS).

Original languageEnglish
Title of host publicationEmerging Information Security and Applications - 2nd International Symposium, EISA 2021, Revised Selected Papers
EditorsWeizhi Meng, Sokratis K. Katsikas
PublisherSpringer Science and Business Media Deutschland GmbH
Pages178-197
Number of pages20
ISBN (Print)9783030939557
DOIs
Publication statusPublished - 2022
Event2nd International Symposium on Emerging Information Security and Applications, EISA 2021 - Virtual, Online
Duration: 12 Nov 202113 Nov 2021

Publication series

NameCommunications in Computer and Information Science
Volume1403 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference2nd International Symposium on Emerging Information Security and Applications, EISA 2021
CityVirtual, Online
Period12/11/2113/11/21

Keywords

  • Anomaly detection systems
  • Behaviour-based anomaly detection systems
  • Insider threat
  • Intrusion Detection Systems
  • Relational Database Management Systems

Fingerprint

Dive into the research topics of 'Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches'. Together they form a unique fingerprint.

Cite this