Alogrithm to prevent and detect insider multi transaction malicious activity in database

Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks are those that come from outside the system, however, insider attacks are those that are launched from insiders of the system. In this thesis is concentrated on insider attacks detection and prevention o...

全面介紹

Saved in:
書目詳細資料
主要作者: Khavidaki, Seyyed Mojtaba Dashti
格式: Thesis
語言:English
出版: 2013
主題:
在線閱讀:http://eprints.utm.my/id/eprint/36700/1/SeyyedMojtabaDashtiKhavidakiMFSKS2013.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks are those that come from outside the system, however, insider attacks are those that are launched from insiders of the system. In this thesis is concentrated on insider attacks detection and prevention on the application level; database is our focus. Insiders have more knowledge about the underlying systems. Because of their knowledge and their privileges of the system resources; their risk can be greater and more severe. The insider execute multi transaction to inference the data, this is called multi transaction malicious. Several techniques have been proposed that tackled the insider multi transaction malicious problem, but most of them concentrate on insider threat detection in computer system level. We describe an algorithm for insider threat detection in database systems that handle multi transaction malicious activity. Our simulation results show resistance against multi transaction insider attack. Also, our results show good performance in terms of decreasing false alarms and increasing coverage detection.