基于结果的关系数据库内部威胁检测

Asmaa Sallam, E. Bertino
{"title":"基于结果的关系数据库内部威胁检测","authors":"Asmaa Sallam, E. Bertino","doi":"10.1145/3292006.3300039","DOIUrl":null,"url":null,"abstract":"Insiders misuse of resources is a real threat to organizations. According to recent security reports, data has been the most vulnerable to attacks by insiders, especially data located in databases and corporate file servers. Although anomaly detection is an effective technique for flagging early signs of insider attacks, modern techniques for the detection of anomalies in database access are not able to detect several sophisticated data misuse scenarios such as attempts to track data updates and the aggregation of data by an insider that exceeds his/her need to perform job functions. In such scenarios, if the insider does not have prior knowledge of the distribution of the target data, many of his/her queries may extract no data or small amounts of data. Therefore, monitoring the total size of data retrieved by each user and comparing it to normal levels will either result in low anomaly detection accuracy or long time to anomaly detection. In this paper, we propose anomaly detection techniques designed to detect data aggregation and attempts to track data updates. Our techniques infer the normal rates of tables references and tuples retrievals from past database access logs. User queries are then analyzed to detect queries that lead to exceeding the normal data access rates. We evaluated the proposed techniques on the query logs of a real database. The results of the evaluation indicate that when the system configuration parameters are adequately selected and sufficient data is available for training, our techniques have low false alarm generation rate and high anomaly detection accuracy.","PeriodicalId":246233,"journal":{"name":"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Result-Based Detection of Insider Threats to Relational Databases\",\"authors\":\"Asmaa Sallam, E. Bertino\",\"doi\":\"10.1145/3292006.3300039\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Insiders misuse of resources is a real threat to organizations. According to recent security reports, data has been the most vulnerable to attacks by insiders, especially data located in databases and corporate file servers. Although anomaly detection is an effective technique for flagging early signs of insider attacks, modern techniques for the detection of anomalies in database access are not able to detect several sophisticated data misuse scenarios such as attempts to track data updates and the aggregation of data by an insider that exceeds his/her need to perform job functions. In such scenarios, if the insider does not have prior knowledge of the distribution of the target data, many of his/her queries may extract no data or small amounts of data. Therefore, monitoring the total size of data retrieved by each user and comparing it to normal levels will either result in low anomaly detection accuracy or long time to anomaly detection. In this paper, we propose anomaly detection techniques designed to detect data aggregation and attempts to track data updates. Our techniques infer the normal rates of tables references and tuples retrievals from past database access logs. User queries are then analyzed to detect queries that lead to exceeding the normal data access rates. We evaluated the proposed techniques on the query logs of a real database. The results of the evaluation indicate that when the system configuration parameters are adequately selected and sufficient data is available for training, our techniques have low false alarm generation rate and high anomaly detection accuracy.\",\"PeriodicalId\":246233,\"journal\":{\"name\":\"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3292006.3300039\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3292006.3300039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

摘要

内部人员滥用资源是对组织的真正威胁。根据最近的安全报告,数据最容易受到内部人员的攻击,尤其是位于数据库和企业文件服务器中的数据。尽管异常检测是标记内部攻击早期迹象的有效技术,但用于检测数据库访问异常的现代技术无法检测到一些复杂的数据滥用场景,例如试图跟踪数据更新和内部人员超过其执行工作功能所需的数据聚合。在这种情况下,如果内部人员事先不知道目标数据的分布,那么他/她的许多查询可能不提取数据或提取少量数据。因此,监控每个用户检索到的数据的总大小,并将其与正常水平进行比较,可能会导致异常检测精度低或异常检测时间长。在本文中,我们提出了用于检测数据聚合和跟踪数据更新的异常检测技术。我们的技术根据过去的数据库访问日志推断表引用和元组检索的正常频率。然后分析用户查询,以检测导致超出正常数据访问速率的查询。我们在一个真实数据库的查询日志上评估了所提出的技术。评估结果表明,当系统配置参数选择适当且有足够的数据用于训练时,我们的技术具有较低的误报率和较高的异常检测准确率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Result-Based Detection of Insider Threats to Relational Databases
Insiders misuse of resources is a real threat to organizations. According to recent security reports, data has been the most vulnerable to attacks by insiders, especially data located in databases and corporate file servers. Although anomaly detection is an effective technique for flagging early signs of insider attacks, modern techniques for the detection of anomalies in database access are not able to detect several sophisticated data misuse scenarios such as attempts to track data updates and the aggregation of data by an insider that exceeds his/her need to perform job functions. In such scenarios, if the insider does not have prior knowledge of the distribution of the target data, many of his/her queries may extract no data or small amounts of data. Therefore, monitoring the total size of data retrieved by each user and comparing it to normal levels will either result in low anomaly detection accuracy or long time to anomaly detection. In this paper, we propose anomaly detection techniques designed to detect data aggregation and attempts to track data updates. Our techniques infer the normal rates of tables references and tuples retrievals from past database access logs. User queries are then analyzed to detect queries that lead to exceeding the normal data access rates. We evaluated the proposed techniques on the query logs of a real database. The results of the evaluation indicate that when the system configuration parameters are adequately selected and sufficient data is available for training, our techniques have low false alarm generation rate and high anomaly detection accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信