Malicious Users’ Transactions: Tackling Insider Threat - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Malicious Users’ Transactions: Tackling Insider Threat

Résumé

This paper investigates the issues of malicious transactions by insiders in database systems. It establishes a number of rule sets to constrain the relationship between data items and transactions. A type of graph, called Predictive Dependency Graph, has been developed to determine data flow patterns among data items. This helps in foretelling which operation of a transaction has the ability to subsequently affect a sensitive data item. In addition, the paper proposes a mechanism to monitor suspicious insiders’ activities and potential harm to the database. With the help of the Predictive DependencyGraphs, the presented model predicts and prevents potential damage caused by malicious transactions.
Fichier principal
Vignette du fichier
978-3-642-30436-1_18_Chapter.pdf (163.16 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01518221 , version 1 (04-05-2017)

Licence

Paternité

Identifiants

Citer

Weihan Li, Brajendra Panda, Qussai Yaseen. Malicious Users’ Transactions: Tackling Insider Threat. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.211-222, ⟨10.1007/978-3-642-30436-1_18⟩. ⟨hal-01518221⟩
63 Consultations
80 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More