메뉴 건너뛰기




Volumn 5776 LNCS, Issue , 2009, Pages 33-48

Database intrusion detection using role profiling with role hierarchy

Author keywords

Database security; Insider threats; Intrusion detection; RBAC; Role profiling

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION; COMPARATIVE EVALUATIONS; COMPUTER SYSTEM SECURITY; DATABASE MANAGEMENT SYSTEM; DATABASE SECURITY; FALSE NEGATIVE RATE; FALSE POSITIVE RATES; INSIDER THREAT; INSIDER THREATS; NORMAL BEHAVIOR; PROFILING METHODS; RBAC; ROLE HIERARCHY; ROLE PROFILING; ROLE-BASED ACCESS CONTROL; USER PROFILING;

EID: 70349863293     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04219-5_3     Document Type: Conference Paper
Times cited : (16)

References (16)
  • 1
    • 33846299959 scopus 로고    scopus 로고
    • Intrusion detection in RBACadministered databases
    • IEEE Computer Society, Los Alamitos
    • Bertino, E., Kamra, A., Terzi, E., Vakali, A.: Intrusion detection in RBACadministered databases. In: ACSAC, pp. 170-182. IEEE Computer Society, Los Alamitos (2005)
    • (2005) ACSAC , pp. 170-182
    • Bertino, E.1    Kamra, A.2    Terzi, E.3    Vakali, A.4
  • 2
    • 35048875879 scopus 로고    scopus 로고
    • Securing DBMS: Characterizing and detecting queryoods
    • Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
    • Bertino, E., Leggieri, T., Terzi, E.: Securing DBMS: Characterizing and detecting queryoods. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.3225, pp. 195- 206. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3225 , pp. 195-206
    • Bertino, E.1    Leggieri, T.2    Terzi, E.3
  • 3
    • 1642409662 scopus 로고    scopus 로고
    • DEMIDS: A misuse detection system for database systems
    • van Biene-Hershey, M.E., Strous, L. (eds.) Kluwer, Dordrecht
    • Chung, C.Y., Gertz, M., Levitt, K.N.: DEMIDS: A misuse detection system for database systems. In: van Biene-Hershey, M.E., Strous, L. (eds.) IICIS, IFIP Conference Proceedings, vol.165, pp. 159-178. Kluwer, Dordrecht (1999)
    • (1999) IICIS, IFIP Conference Proceedings , vol.165 , pp. 159-178
    • Chung, C.Y.1    Gertz, M.2    Levitt, K.N.3
  • 4
    • 38149127253 scopus 로고    scopus 로고
    • Integrated intrusion detection in databases
    • Bondavalli, A., Brasileiro, F., Rajsbaum, S. (eds.) LADC 2007. Springer, Heidelberg
    • Fonseca, J., Vieira, M., Madeira, H.: Integrated intrusion detection in databases. In: Bondavalli, A., Brasileiro, F., Rajsbaum, S. (eds.) LADC 2007. LNCS, vol.4746, pp. 198-211. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4746 , pp. 198-211
    • Fonseca, J.1    Vieira, M.2    Madeira, H.3
  • 6
    • 30644462262 scopus 로고    scopus 로고
    • For information technology - Role-based access control
    • American National Standards Institute. January
    • American National Standards Institute. For information technology - role-based access control. ANSI INCITS 359 (January 2004)
    • (2004) ANSI INCITS 359
  • 7
    • 46749133616 scopus 로고    scopus 로고
    • Detecting anomalous access patterns in relational databases
    • Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB Journal 17(5), 1063-1077 (2008)
    • (2008) VLDB Journal , vol.17 , Issue.5 , pp. 1063-1077
    • Kamra, A.1    Terzi, E.2    Bertino, E.3
  • 8
    • 84956982801 scopus 로고    scopus 로고
    • Learning fingerprints for a database intrusion detection system
    • Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. Springer, Heidelberg
    • Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detection system. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.2502, pp. 264-280. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2502 , pp. 264-280
    • Lee, S.Y.1    Low, W.L.2    Wong, P.Y.3
  • 10
    • 84909595754 scopus 로고    scopus 로고
    • DIDAFIT: Detecting intrusions in databases through fingerprinting transactions
    • Low, W.L., Lee, J., Teoh, P.: DIDAFIT: Detecting intrusions in databases through fingerprinting transactions. In: ICEIS, pp. 121-128 (2002)
    • (2002) ICEIS , pp. 121-128
    • Low, W.L.1    Lee, J.2    Teoh, P.3
  • 12
    • 84869621771 scopus 로고    scopus 로고
    • Microsoft MSDN. February
    • Microsoft MSDN. AdventureWorks sample OLTP database, http://msdn. microsoft.com/en-us/library/ms124659.aspx (February 2009)
    • (2009) AdventureWorks Sample OLTP Database
  • 14
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S.L., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2), 85-106 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 16
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Julisch, K., Krügel, C. (eds.) DIMVA 2005. Springer, Heidelberg
    • Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 123-140. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.