DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations

Muhammad Imran Khan, S. Foley, B. O’Sullivan
{"title":"DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations","authors":"Muhammad Imran Khan, S. Foley, B. O’Sullivan","doi":"10.4018/978-1-5225-5984-9.CH010","DOIUrl":null,"url":null,"abstract":"Insiders are legitimate users of a system; however, they pose a threat because of their granted access privileges. Anomaly-based intrusion detection approaches have been shown to be effective in the detection of insiders' malicious behavior. Database management systems (DBMS) are the core of any contemporary organization enabling them to store and manage their data. Yet insiders may misuse their privileges to access stored data via a DBMS with malicious intentions. In this chapter, a taxonomy of anomalous DBMS access detection systems is presented. Secondly, an anomaly-based mechanism that detects insider attacks within a DBMS framework is proposed whereby a model of normative behavior of insiders n-grams are used to capture normal query patterns in a log of SQL queries generated from a synthetic banking application system. It is demonstrated that n-grams do capture the short-term correlations inherent in the application. This chapter also outlines challenges pertaining to the design of more effective anomaly-based intrusion detection systems to detect insider attacks.","PeriodicalId":271918,"journal":{"name":"Advances in Electronic Government, Digital Divide, and Regional Development","volume":"62 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Electronic Government, Digital Divide, and Regional Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-5984-9.CH010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Insiders are legitimate users of a system; however, they pose a threat because of their granted access privileges. Anomaly-based intrusion detection approaches have been shown to be effective in the detection of insiders' malicious behavior. Database management systems (DBMS) are the core of any contemporary organization enabling them to store and manage their data. Yet insiders may misuse their privileges to access stored data via a DBMS with malicious intentions. In this chapter, a taxonomy of anomalous DBMS access detection systems is presented. Secondly, an anomaly-based mechanism that detects insider attacks within a DBMS framework is proposed whereby a model of normative behavior of insiders n-grams are used to capture normal query patterns in a log of SQL queries generated from a synthetic banking application system. It is demonstrated that n-grams do capture the short-term correlations inherent in the application. This chapter also outlines challenges pertaining to the design of more effective anomaly-based intrusion detection systems to detect insider attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于检测当代组织内部威胁的DBMS日志分析
内部人员是系统的合法用户;但是,由于授予了访问权限,它们构成了威胁。基于异常的入侵检测方法在检测内部人员的恶意行为方面已被证明是有效的。数据库管理系统(DBMS)是任何当代组织存储和管理数据的核心。然而,内部人员可能会滥用他们的特权,恶意地通过DBMS访问存储的数据。在本章中,介绍了异常DBMS访问检测系统的分类。其次,提出了一种在DBMS框架内检测内部攻击的基于异常的机制,利用内部n-gram的规范行为模型来捕获从合成银行应用系统生成的SQL查询日志中的正常查询模式。证明了n-gram确实捕获了应用程序中固有的短期相关性。本章还概述了与设计更有效的基于异常的入侵检测系统以检测内部攻击有关的挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Handbook of Research on Cyber Approaches to Public Administration and Social Policy Advances in Deep Learning Applications for Smart Cities Regional Economic Integration and Global Competition in the Post-COVID-19 Era Handbook of Research on Comparative Approaches to the Digital Age Revolution in Europe and the Americas DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1