loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jonathan White ; Brajendra Panda ; Quassai Yassen ; Khanh Nguyen and Weihan Li

Affiliation: University of Arkansas, United States

Abstract: A new approach for detecting malicious access to a database system is proposed and tested in this work. The proposed method relies upon manipulating usage information from database logs into three dimensional null-related matrix clusters that reveals new information about which sets of data items should never be related during defined temporal time frames across several applications. If access is detected in these three dimensional null-related clusters, this is an indication of illicit behavior, and further security procedures should occur. In this paper, we describe the null affinity algorithm and illustrate by several examples its use for problem decomposition and access control to data items which should not be accessed together, resulting in a new and novel way to detect malicious access that has never been proposed before.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.140.186.241

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
White, J.; Panda, B.; Yassen, Q.; Nguyen, K. and Li, W. (2009). Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. In Proceedings of the 7th International Workshop on Security in Information Systems (ICEIS 2009) - WOSIS; ISBN 978-989-8111-91-3, SciTePress, pages 93-102. DOI: 10.5220/0002199000930102

@conference{wosis09,
author={Jonathan White. and Brajendra Panda. and Quassai Yassen. and Khanh Nguyen. and Weihan Li.},
title={Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation},
booktitle={Proceedings of the 7th International Workshop on Security in Information Systems (ICEIS 2009) - WOSIS},
year={2009},
pages={93-102},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002199000930102},
isbn={978-989-8111-91-3},
}

TY - CONF

JO - Proceedings of the 7th International Workshop on Security in Information Systems (ICEIS 2009) - WOSIS
TI - Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation
SN - 978-989-8111-91-3
AU - White, J.
AU - Panda, B.
AU - Yassen, Q.
AU - Nguyen, K.
AU - Li, W.
PY - 2009
SP - 93
EP - 102
DO - 10.5220/0002199000930102
PB - SciTePress