Title :
Mitigating Malicious Updates: Prevention of Insider Threat to Databases
Author :
Ragavan, Harini ; Panda, Biplab
Author_Institution :
Comput. Sci. & Comput. Eng. Dept., Univ. of Arkansas, Fayetteville, AR, USA
Abstract :
Insider threats cause serious damage to data in any organization and is considered as a grave issue. In spite of the presence of threat prevention mechanisms, insiders can continue to attack a database by figuring out the dependency relationships among data items. Thus, examining write operations performed by an insider by taking advantage of dependencies aids in mitigating insider threats. We have developed two attack prevention models, which involve logs and dependency graphs respectively, to monitor data items and prevent malicious operations on them. The developed algorithms have been implemented on a simulated database and the results show that the models effectively mitigate insider threats arising from write operations.
Keywords :
database management systems; graph theory; security of data; attack prevention models; data items monitoring; database; dependency graph; dependency relationships; insider threat prevention; logs; malicious operations; malicious update mitigation; write operations; Data models; Databases; Delays; Monitoring; Organizations; Remuneration; Security; Database; Dependency Graph; Insider Threat; Log;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.95