Research on Database Anomaly Access Detection Based on User Profile Construction

作者: Xuren Wang , Zhou Fang , Dong Wang , Anran Feng , Qiuyun Wang

DOI: 10.1007/978-981-15-9739-8_30

关键词:

摘要: As a platform for data storage and administration, database contains private large information, which makes it target of malicious personnel attacks. To prevent attacks from outsiders, administrators can limit unauthorized user access through role-based control system, while masquerade insiders are often less noticeable. Therefore, the research on anomaly detection based behavior has important practical application value. In this paper, we proposed system securing database. We took advantage profile construction method to describe query statements without grouping. Then k-means random tree were applied profile. With specified constructed according characteristics submitted by user, is used group users. algorithm train detector. The experimental results show that fast effective detecting behaviors.

参考文章(16)
Charissa Ann Ronao, Sung-Bae Cho, Mining SQL Queries to Detect Anomalous Database Access using Random Forest and PCA international conference industrial, engineering & other applications applied intelligent systems. pp. 151- 160 ,(2015) , 10.1007/978-3-319-19066-2_15
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Mehdi Haddad, Jovan Stevovic, Annamaria Chiasera, Yannis Velegrakis, Mohand-Saïd Hacid, Access Control for Data Integration in Presence of Data Dependencies database systems for advanced applications. pp. 203- 217 ,(2014) , 10.1007/978-3-319-05813-9_14
Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu, A Dynamic Approach to Detect Anomalous Queries on Relational Databases conference on data and application security and privacy. pp. 245- 252 ,(2015) , 10.1145/2699026.2699120
Ninghui Li, Mahesh V. Tripunitara, Security analysis in role-based access control Proceedings of the ninth ACM symposium on Access control models and technologies - SACMAT '04. pp. 126- 135 ,(2004) , 10.1145/990036.990058
Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo, Privacy-aware role based access control symposium on access control models and technologies. pp. 41- 50 ,(2007) , 10.1145/1266840.1266848
You Chen, Steve Nyemba, Bradley Malin, Detecting Anomalous Insiders in Collaborative Information Systems IEEE Transactions on Dependable and Secure Computing. ,vol. 9, pp. 332- 344 ,(2012) , 10.1109/TDSC.2012.11
Ashish Kamra, Evimaria Terzi, Elisa Bertino, Detecting anomalous access patterns in relational databases very large data bases. ,vol. 17, pp. 1063- 1077 ,(2008) , 10.1007/S00778-007-0051-4
Jong-hyuk Roh, Sung-Hun Lee, Soohyung Kim, Anomaly detection of access patterns in database 2015 International Conference on Information and Communication Technology Convergence (ICTC). pp. 1112- 1115 ,(2015) , 10.1109/ICTC.2015.7354751
Victor Vianu, Serge Abiteboul, Pierre Bourhis, A formal study of collaborative access control in distributed datalog international conference on database theory. pp. 17- ,(2016) , 10.4230/LIPICS.ICDT.2016.10