DBSAFE-An Anomaly Detection System to Protect Databases From Exfiltration Attempts

被引:17
作者
Sallam, Asmaa [1 ,2 ]
Bertino, Elisa [1 ,2 ]
Hussain, Syed Rafiul [1 ,2 ]
Landers, David [3 ]
Lefler, R. Michael [4 ]
Steiner, Donald [3 ]
机构
[1] CERIAS, Cyber Ctr, W Lafayette, IN 47907 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Northrop Grumman Corp, Informat Syst Sector, Falls Church, VA 22042 USA
[4] Northrop Grumman Corp, Enterprise Shared Serv Org, Falls Church, VA 22042 USA
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Data engineering; data systems; information security;
D O I
10.1109/JSYST.2015.2487221
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attempts by insiders to exfiltrate data have become a severe threat to the enterprise. Conventional data security techniques, such as access control and encryption, must be augmented with techniques to detect anomalies in data access that may indicate exfiltration attempts. In this paper, we present the design and evaluation of DBSAFE, a system to detect, alert on, and respond to anomalies in database access designed specifically for relational database management systems (DBMS). The system automatically builds and maintains profiles of normal user and application behavior, based on their interaction with the monitored database during a training phase. The system then uses these profiles to detect anomalous behavior that deviates from normality. Once an anomaly is detected, the system uses predetermined policies guiding automated and/or human response to the anomaly. The DBSAFE architecture does not impose any restrictions on the type of the monitored DBMS. Evaluation results indicate that the proposed techniques are indeed effective in detecting anomalies.
引用
收藏
页码:483 / 493
页数:11
相关论文
共 20 条
[1]  
Bertino E, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P155
[2]  
Bertino E., 2012, SYNTHESIS LECT DATA, V4, P1, DOI [DOI 10.2200/S00431ED1V01Y201207DTM028, 10.2200/S00431ED1V01Y201207DTM028]
[3]   Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases [J].
Chagarlamudi, Manideep ;
Panda, Brajendra ;
Hu, Yi .
PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, :1616-+
[4]  
Chung C. Y., 2000, DEMIDS MISUSE DETECT, P159, DOI DOI 10.1007/978-0-387-35501-612
[5]  
Gulgezen G, 2009, LECT NOTES ARTIF INT, V5781, P455, DOI 10.1007/978-3-642-04180-8_47
[6]  
Hu Y, 2003, SEVENTH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, P329
[7]  
Hussain S.R., 2015, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, P25
[8]  
IBM, IBM INFOSPHERE GUARD
[9]   Detecting anomalous access patterns in relational databases [J].
Kamra, Ashish ;
Terzi, Evimaria ;
Bertino, Elisa .
VLDB JOURNAL, 2008, 17 (05) :1063-1077
[10]   Design and Implementation of an Intrusion Response System for Relational Databases [J].
Kamra, Ashish ;
Bertino, Elisa .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (06) :875-888