메뉴 건너뛰기




Volumn 6307 LNCS, Issue , 2010, Pages 382-401

A data-centric approach to insider attack detection in database systems

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; LEARNING ALGORITHMS; QUERY PROCESSING;

EID: 78249276495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15512-3_20     Document Type: Conference Paper
Times cited : (130)

References (36)
  • 1
    • 78649299251 scopus 로고    scopus 로고
    • Owasp top 10 2007 (2007), http://www.owasp.org/index.php/Top-10-2007
    • (2007) Owasp Top 10 2007
  • 5
    • 1142303671 scopus 로고    scopus 로고
    • Dynamic sample selection for approximate query processing
    • Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. In: SIGMOD Conference, pp. 539-550 (2003)
    • (2003) SIGMOD Conference , pp. 539-550
    • Babcock, B.1    Chaudhuri, S.2    Das, G.3
  • 9
    • 79960570447 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: ICDT, pp. 316-330 (2001)
    • (2001) ICDT , pp. 316-330
    • Buneman, P.1    Khanna, S.2    Tan, W.C.3
  • 14
    • 78249232186 scopus 로고    scopus 로고
    • Microsoft: 2007 E-Crime Watch Survey
    • US Secret Service, CERT
    • CSO Magazine, US Secret Service, CERT, Microsoft: 2007 E-Crime Watch Survey (2007), http://www.sei.cmu.edu/about/press/releases/2007ecrime.html
    • (2007) CSO Magazine
  • 16
  • 18
    • 46749133616 scopus 로고    scopus 로고
    • Detecting anomalous access patterns in relational databases
    • Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. The VLDB Journal 17(5), 1063-1077 (2008)
    • (2008) The VLDB Journal , vol.17 , Issue.5 , pp. 1063-1077
    • Kamra, A.1    Terzi, E.2    Bertino, E.3
  • 21
    • 84956982801 scopus 로고    scopus 로고
    • Learning fingerprints for a database intrusion detection system
    • Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. Springer, Heidelberg
    • Lee, S.Y., Low, W.L., Wong, P.Y.: Learning fingerprints for a database intrusion detection system. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 264-280. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2502 , pp. 264-280
    • Lee, S.Y.1    Low, W.L.2    Wong, P.Y.3
  • 25
    • 0022821574 scopus 로고
    • Simple random sampling from relational databases
    • Olken, F., Rotem, D.: Simple random sampling from relational databases. In: VLDB, pp. 160-169 (1986)
    • (1986) VLDB , pp. 160-169
    • Olken, F.1    Rotem, D.2
  • 31
    • 26444449929 scopus 로고    scopus 로고
    • A comprehensive approach to anomaly detection in relational databases
    • Spalka, A., Lehnhardt, J.: A comprehensive approach to anomaly detection in relational databases. In: DBSec, pp. 207-221 (2005)
    • (2005) DBSec , pp. 207-221
    • Spalka, A.1    Lehnhardt, J.2
  • 32
    • 70350394979 scopus 로고    scopus 로고
    • Database intrusion detection using weighted sequence mining
    • Srivastava, A., Sural, S., Majumdar, A.K.: Database intrusion detection using weighted sequence mining. Journal of Computers 1(4), 8-17 (2006)
    • (2006) Journal of Computers , vol.1 , Issue.4 , pp. 8-17
    • Srivastava, A.1    Sural, S.2    Majumdar, A.K.3
  • 33
    • 85028807471 scopus 로고
    • Implementation of integrity constraints and views by query modification
    • Stonebraker, M.: Implementation of integrity constraints and views by query modification. In: SIGMOD Conference, pp. 65-78 (1975)
    • (1975) SIGMOD Conference , pp. 65-78
    • Stonebraker, M.1
  • 34
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of sql attacks. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 123-140. Springer, Heidelberg (2005) (Pubitemid 41423153)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.