A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Misuse Detection in Database Systems Through User Profiling
1999
International Symposium on Recent Advances in Intrusion Detection
Her research interests include data mining and knowledge discovery, misuse detection and database security. ...
(Computer Science) degree from the University of Hong Kong in 1996 and her M.Sci.(Computer Science) degree from the University of California, Davis in 1998. ...
In the proposed approach we derive profiles to describe the typical behavior for users and roles in a relational database system. The profiles generated can be used in detecting misuse behavior. ...
dblp:conf/raid/ChungGL99
fatcat:6s2rq7lidrhpzel346ltn3jije
A Framework For Monitoring Insider Misuse Of It Applications
2004
Information Security for South Africa
Current Intrusion Detection Systems are ineffective in this context, because they do not have knowledge of user responsibilities, the normal working scope for a particular position, or the separation of ...
The approach argues that users with similar roles and responsibilities will exhibit similar behaviour within the system, enabling any activity that deviates from the normal profile to be flagged for further ...
In addition, in an adaptive system, the process of profile refinement might be exploited by wily misfeasors that gradually train the system to accept misuse behaviour as normal. ...
dblp:conf/issa/Phyo04
fatcat:gn4jmbuggvdf3f5r4vph3vpxcm
Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection
2012
International Journal of Advanced Computer Science and Applications
In this paper we propose a framework based on misuse and anomaly detection techniques to detect SQL injection attack. ...
The main idea of this framework is to create a profile for legitimate database behavior extracted from applying association rules on XML file containing queries submitted from application to the database ...
A general framework for detecting malicious database transaction patterns using data mining was proposed by Bertino et al. in [16, 17] to mine database logs to form user profiles that can model normal ...
doi:10.14569/ijacsa.2012.030321
fatcat:nt2kaelnk5dwrg4pvd53nk4t7u
Host-based Intrusion Detection and Prevention System (HIDPS)
2013
International Journal of Computer Applications
with two phases of intrusion detection engines-Misuse and Anomaly detections for the best-fit system to any unique host computer systems. ...
This paper reviewed and compared the related various research papers on HIDPS to provide a suitable norm on HIDPS at two levels of intrusion detection and prevention i.e., user level and kernel level along ...
Behaviour-based Detection [13] have knowledge base database, which contain profiles of the monitored activities. Many types of profiles are kept in the anomaly database detection. ...
doi:10.5120/12136-8419
fatcat:hq5bmwbupjc6rk75o3chxg5aga
Misuse detection for information retrieval systems
2003
Proceedings of the twelfth international conference on Information and knowledge management - CIKM '03
Any new activity of the user is compared to the user profile to detect a potential misuse for the authorized user. We propose four different methods to detect misuse in information retrieval systems. ...
Our approach is based on building and maintaining a profile of the behavior of the system user through tracking, or monitoring of user activity within the information retrieval system. ...
Chung et al. in [2] describe their misuse detection system, DEMIDS, for database applications. ...
doi:10.1145/956900.956901
fatcat:ijhaioekonbgxowmzhlxz7r4j4
Intrusion Detection Framework for SQL Injection
[article]
2020
arXiv
pre-print
After that we will use a hybrid (anomaly + misuse) detection model which will depend on data mining techniques to detect queries that deviates from our normal behavior profile. ...
The main idea of our proposed solution is to create trusted user profiles fetched from the Queries submitted by authorized users by using association rules. ...
the normal user profile. ...
arXiv:2009.13868v1
fatcat:frctiahexjg7zbqeo3n66zsll4
Analytical Approach for Security of Sensitive Business Database
2015
International Journal of Database Theory and Application
A brief view of securing the network, server and operating system is also provided in the present paper. ...
Sensitive database security is an integral part to meet the company's abeyance. Securing the sensitive data in mixed database environment has increased over the past few years. ...
DEMIDS (Detection of Misuse in Database Systems) is the system being used which contains set of tools to derive users profiles from audit logs. ...
doi:10.14257/ijdta.2015.8.3.05
fatcat:la6klii2brcd7fsbaildranmza
Anomaly Detection for RBAC Systems in UNIX/LINUX Environment with User Behavior
2018
International Journal of Engineering & Technology
It keeps track of the user behavior and identifies anomalies in user behavior which helps in misuse of privileges. ...
The RBAC model manages the privileges of the user within a system or application. However it is possible for a user to misuse his privileges that are assigned. ...
Acknowledgement I would like to thank Bhuvaneswari A, Nagalakshmi K for their help in coding, getting the results and in writing the paper. ...
doi:10.14419/ijet.v7i4.5.20002
fatcat:6pofndreyvgdpba5xgj6dw4az4
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems – A Brief Survey of Concepts and Approaches
[article]
2020
arXiv
pre-print
Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks. ...
This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses ...
Signature-based Detection Systems or Knowledge-based Detection Systems) Detecting Anomalous access to
Relational Databases
Anomaly Detection Systems
(Behavioural-based Systems)
Misuse Detection Systems ...
arXiv:2011.02308v1
fatcat:ocd3jkt5hvfp7difbh6ukw6tta
PIDS: a privacy intrusion detection system
2004
Internet Research
This paper proposes a system that uses Intrusion Detection System (IDS) technologies to help safeguard such private information. ...
It is assumed that the private information is stored in a central networked repository (using, for example, network-attached storage). ...
Future research on this system will focus on the construction of a prototype that will allow experimentation, particularly to determine the effectiveness of our application of throttling. 7. ...
doi:10.1108/10662240410566953
fatcat:3r3bgbycojafjichb7jr6gwncy
Combatting Insider Threats
[chapter]
2010
Advances in Information Security
This chapter seeks to cope with insider misuse in a broad range of application domainsfor example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care ...
To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. ...
Detection, Analysis, and Identification of Misuse In the absence of good prevention, it is of course desirable to detect known defined types of misuse (e.g., through rule-based detection) as well as otherwise ...
doi:10.1007/978-1-4419-7133-3_2
fatcat:nlrc6r5mibayxnsttn4rmrgvzm
Creating a Complete Model of an Intrusion Detection System effective on the LAN
2012
International Journal of Advanced Computer Science and Applications
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. ...
Among the systems is intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. ...
The use of databases is very important in our model, we opted for the use of three databases: a. Profiles database contains all information relating to user profiles. ...
doi:10.14569/ijacsa.2012.030523
fatcat:qzuw3kcuvjbz3e2i7z3572fbaa
Security Issues and Their Techniques in DBMS - A Novel Survey
2014
International Journal of Computer Applications
Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases. ...
Nowadays a Database security has become an important issue in technical world. ...
It is called a misuse-detection system, created for relational databases. It uses audit data log to retrieve profiles describing typical behaviour of users in Database Management System. ...
doi:10.5120/14905-3402
fatcat:ake3pld5wfhovfrjvygxj2olka
Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework
2012
International Journal of Computer Applications
In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. ...
To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. ...
Intelligent intrusion detection system framework using mobile agents [3] which detects the intruders based on the user profile and process profile. ...
doi:10.5120/7848-1084
fatcat:vmrqhw6drvfytgnolqjzdxvd2y
Survey on Security Issues and Their Techniques in DBMS
2018
International Journal of Advanced Research in Computer Science and Software Engineering
Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases. ...
Nowadays a Database security has become an important issue in technical world. ...
It is called a misuse-detection system, created for relational databases. It uses audit data log to retrieve profiles describing typical behaviour of users in Database Management System. ...
doi:10.23956/ijarcsse.v8i1.544
fatcat:nyffcmgbendn3pr5h4jtbdfjmm
« Previous
Showing results 1 — 15 out of 13,399 results