Database Anomalous Activities - Detection and Quantification

Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone

Abstract

.

References

  1. Bockermann, C., Apel, M., and Meier, M. (2009). Learning SQL for database intrusion detection using contextsensitive modelling. In Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 5587, pages 196-205. Springer.
  2. Carvalho, V. R. and Cohen, W. W. (2007). Preventing information leaks in email. In Proceedings of SIAM International Conference on Data Mining.
  3. Fonseca, J., Vieira, M., and Madeira, H. (2007). Integrated intrusion detection in databases. In Dependable Computing, LNCS 4746, pages 198-211. Springer.
  4. Gafny, M., Shabtai, A., Rokach, L., and Elovici, Y. (2010). Detecting data misuse by applying context-based data linkage. In Proceedings of Workshop on Insider Threats, pages 3-12. ACM.
  5. Gessiou, E., Vu, Q. H., and Ioannidis, S. (2011). IRILD: an Information Retrieval based method for Information Leak Detection. In Proceedings of European Conference on Computer Network Defense, pages 33-40. IEEE.
  6. Gómez-Hidalgo, J. M., Martin Abreu, J. M., Nieves, J., Santos, I., Brezo, F., and Bringas, P. G. (2010). Data leak prevention through named entity recognition. In Proceedings of International Conference on Social Computing, pages 1129-1134. IEEE.
  7. Hart, M., Manadhata, P., and Johnson, R. (2011). Text classification for data loss prevention. In Privacy Enhancing Technologies, LNCS 6794, pages 18-37. Springer.
  8. Information Age (2012). New EU data laws to include 24hr breach notification.
  9. Kamra, A., Terzi, E., and Bertino, E. (2007). Detecting anomalous access patterns in relational databases. The VLDB Journal, 17(5):1063-1077.
  10. Koch, R. (2011). Towards next-generation intrusion detection. In Proceedings of International Conference on Cyber Conflict, pages 1-18. IEEE.
  11. Mathew, S. and Petropoulos, M. (2010). A data-centric approach to insider attack detection in database systems. In Recent Advances in Intrusion Detection, LNCS 6307, pages 382-401. Springer.
  12. Roichman, A. and Gudes, E. (2008). DIWeDa - Detecting Intrusions in Web Databases. In Data and Applications Security XXII, LNCS 5094, pages 313-329. Springer.
  13. Santos, R., Bernardino, J., Vieira, M., and Rasteiro, D. (2012). Securing Data Warehouses from Web-Based Intrusions. In Web Information Systems Engineering, LNCS 7651, pages 681-688. Springer.
  14. Shabtai, A., Elovici, Y., and Rokach, L. (2012). A Survey of Data Leakage Detection and Prevention Solutions. SpringerBriefs in Computer Science. Springer.
  15. Spitzner, L. (2003). Honeypots: Catching the insider threat. In Proceedings of Computer Security Applications Conference, pages 170-179. IEEE.
  16. Wu, G., Osborn, S., and Jin, X. (2009). Database intrusion detection using role profiling with role hierarchy. In Secure Data Management, LNCS 5776, pages 33-48. Springer.
Download


Paper Citation


in Harvard Style

Costante E., Vavilis S., Etalle S., den Hartog J., Petkovic M. and Zannone N. (2013). Database Anomalous Activities - Detection and Quantification . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 603-608. DOI: 10.5220/0004612206030608


in Bibtex Style

@conference{secrypt13,
author={Elisa Costante and Sokratis Vavilis and Sandro Etalle and Jerry den Hartog and Milan Petkovic and Nicola Zannone},
title={Database Anomalous Activities - Detection and Quantification},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={603-608},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004612206030608},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Database Anomalous Activities - Detection and Quantification
SN - 978-989-8565-73-0
AU - Costante E.
AU - Vavilis S.
AU - Etalle S.
AU - den Hartog J.
AU - Petkovic M.
AU - Zannone N.
PY - 2013
SP - 603
EP - 608
DO - 10.5220/0004612206030608