Filters








13,399 Hits in 4.9 sec

Misuse Detection in Database Systems Through User Profiling

Christina Yip Chung, Michael Gertz, Karl N. Levitt
1999 International Symposium on Recent Advances in Intrusion Detection  
Her research interests include data mining and knowledge discovery, misuse detection and database security.  ...  (Computer Science) degree from the University of Hong Kong in 1996 and her M.Sci.(Computer Science) degree from the University of California, Davis in 1998.  ...  In the proposed approach we derive profiles to describe the typical behavior for users and roles in a relational database system. The profiles generated can be used in detecting misuse behavior.  ... 
dblp:conf/raid/ChungGL99 fatcat:6s2rq7lidrhpzel346ltn3jije

A Framework For Monitoring Insider Misuse Of It Applications

Aung Htike Phyo
2004 Information Security for South Africa  
Current Intrusion Detection Systems are ineffective in this context, because they do not have knowledge of user responsibilities, the normal working scope for a particular position, or the separation of  ...  The approach argues that users with similar roles and responsibilities will exhibit similar behaviour within the system, enabling any activity that deviates from the normal profile to be flagged for further  ...  In addition, in an adaptive system, the process of profile refinement might be exploited by wily misfeasors that gradually train the system to accept misuse behaviour as normal.  ... 
dblp:conf/issa/Phyo04 fatcat:gn4jmbuggvdf3f5r4vph3vpxcm

Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection

Shaimaa Ezzat, Mohamed I., Laila M., Yehia K.
2012 International Journal of Advanced Computer Science and Applications  
In this paper we propose a framework based on misuse and anomaly detection techniques to detect SQL injection attack.  ...  The main idea of this framework is to create a profile for legitimate database behavior extracted from applying association rules on XML file containing queries submitted from application to the database  ...  A general framework for detecting malicious database transaction patterns using data mining was proposed by Bertino et al. in [16, 17] to mine database logs to form user profiles that can model normal  ... 
doi:10.14569/ijacsa.2012.030321 fatcat:nt2kaelnk5dwrg4pvd53nk4t7u

Host-based Intrusion Detection and Prevention System (HIDPS)

Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh
2013 International Journal of Computer Applications  
with two phases of intrusion detection engines-Misuse and Anomaly detections for the best-fit system to any unique host computer systems.  ...  This paper reviewed and compared the related various research papers on HIDPS to provide a suitable norm on HIDPS at two levels of intrusion detection and prevention i.e., user level and kernel level along  ...  Behaviour-based Detection [13] have knowledge base database, which contain profiles of the monitored activities. Many types of profiles are kept in the anomaly database detection.  ... 
doi:10.5120/12136-8419 fatcat:hq5bmwbupjc6rk75o3chxg5aga

Misuse detection for information retrieval systems

Rebecca Cathey, Ling Ma, Nazli Goharian, David Grossman
2003 Proceedings of the twelfth international conference on Information and knowledge management - CIKM '03  
Any new activity of the user is compared to the user profile to detect a potential misuse for the authorized user. We propose four different methods to detect misuse in information retrieval systems.  ...  Our approach is based on building and maintaining a profile of the behavior of the system user through tracking, or monitoring of user activity within the information retrieval system.  ...  Chung et al. in [2] describe their misuse detection system, DEMIDS, for database applications.  ... 
doi:10.1145/956900.956901 fatcat:ijhaioekonbgxowmzhlxz7r4j4

Intrusion Detection Framework for SQL Injection [article]

Israr Ali, Syed Hasan Adil, Mansoor Ebrahim
2020 arXiv   pre-print
After that we will use a hybrid (anomaly + misuse) detection model which will depend on data mining techniques to detect queries that deviates from our normal behavior profile.  ...  The main idea of our proposed solution is to create trusted user profiles fetched from the Queries submitted by authorized users by using association rules.  ...  the normal user profile.  ... 
arXiv:2009.13868v1 fatcat:frctiahexjg7zbqeo3n66zsll4

Analytical Approach for Security of Sensitive Business Database

Anusha Gupta, Sanjay Kumar Dubey
2015 International Journal of Database Theory and Application  
A brief view of securing the network, server and operating system is also provided in the present paper.  ...  Sensitive database security is an integral part to meet the company's abeyance. Securing the sensitive data in mixed database environment has increased over the past few years.  ...  DEMIDS (Detection of Misuse in Database Systems) is the system being used which contains set of tools to derive users profiles from audit logs.  ... 
doi:10.14257/ijdta.2015.8.3.05 fatcat:la6klii2brcd7fsbaildranmza

Anomaly Detection for RBAC Systems in UNIX/LINUX Environment with User Behavior

Shashidhar V, Venkatesulu D
2018 International Journal of Engineering & Technology  
It keeps track of the user behavior and identifies anomalies in user behavior which helps in misuse of privileges.  ...  The RBAC model manages the privileges of the user within a system or application. However it is possible for a user to misuse his privileges that are assigned.  ...  Acknowledgement I would like to thank Bhuvaneswari A, Nagalakshmi K for their help in coding, getting the results and in writing the paper.  ... 
doi:10.14419/ijet.v7i4.5.20002 fatcat:6pofndreyvgdpba5xgj6dw4az4

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems – A Brief Survey of Concepts and Approaches [article]

Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan
2020 arXiv   pre-print
Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks.  ...  This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses  ...  Signature-based Detection Systems or Knowledge-based Detection Systems) Detecting Anomalous access to Relational Databases Anomaly Detection Systems (Behavioural-based Systems) Misuse Detection Systems  ... 
arXiv:2011.02308v1 fatcat:ocd3jkt5hvfp7difbh6ukw6tta

PIDS: a privacy intrusion detection system

Hein S. Venter, Martin S. Olivier, Jan H.P. Eloff
2004 Internet Research  
This paper proposes a system that uses Intrusion Detection System (IDS) technologies to help safeguard such private information.  ...  It is assumed that the private information is stored in a central networked repository (using, for example, network-attached storage).  ...  Future research on this system will focus on the construction of a prototype that will allow experimentation, particularly to determine the effectiveness of our application of throttling. 7.  ... 
doi:10.1108/10662240410566953 fatcat:3r3bgbycojafjichb7jr6gwncy

Combatting Insider Threats [chapter]

Peter G. Neumann
2010 Advances in Information Security  
This chapter seeks to cope with insider misuse in a broad range of application domainsfor example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care  ...  To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections.  ...  Detection, Analysis, and Identification of Misuse In the absence of good prevention, it is of course desirable to detect known defined types of misuse (e.g., through rule-based detection) as well as otherwise  ... 
doi:10.1007/978-1-4419-7133-3_2 fatcat:nlrc6r5mibayxnsttn4rmrgvzm

Creating a Complete Model of an Intrusion Detection System effective on the LAN

Yousef FARHAOUI, Ahmed ASIMI
2012 International Journal of Advanced Computer Science and Applications  
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security.  ...  Among the systems is intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system.  ...  The use of databases is very important in our model, we opted for the use of three databases: a. Profiles database contains all information relating to user profiles.  ... 
doi:10.14569/ijacsa.2012.030523 fatcat:qzuw3kcuvjbz3e2i7z3572fbaa

Security Issues and Their Techniques in DBMS - A Novel Survey

Mohd Muntjir, Sultan Aljahdali, Mohd Asadullah, Junedul Haq
2014 International Journal of Computer Applications  
Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.  ...  Nowadays a Database security has become an important issue in technical world.  ...  It is called a misuse-detection system, created for relational databases. It uses audit data log to retrieve profiles describing typical behaviour of users in Database Management System.  ... 
doi:10.5120/14905-3402 fatcat:ake3pld5wfhovfrjvygxj2olka

Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework

R. Sasikumar, D. Manjula
2012 International Journal of Computer Applications  
In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access.  ...  To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent.  ...  Intelligent intrusion detection system framework using mobile agents [3] which detects the intruders based on the user profile and process profile.  ... 
doi:10.5120/7848-1084 fatcat:vmrqhw6drvfytgnolqjzdxvd2y

Survey on Security Issues and Their Techniques in DBMS

Jaychand Vishwakarma, Abhishek Shukla
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.  ...  Nowadays a Database security has become an important issue in technical world.  ...  It is called a misuse-detection system, created for relational databases. It uses audit data log to retrieve profiles describing typical behaviour of users in Database Management System.  ... 
doi:10.23956/ijarcsse.v8i1.544 fatcat:nyffcmgbendn3pr5h4jtbdfjmm
« Previous Showing results 1 — 15 out of 13,399 results