certain time frames, resulting in a three dimensional usage matrix. This matrix allows
a better prediction of potential misuse by allowing quicker and more precise
prediction of items that should not be used together across the time, data item, and
application dimensions. Suspicious queries are then compared to the maximized usage
array and a distance value is calculated for each non conforming action. These
distances are summed to reveal how far from what was expected this access is. If the
access is above a certain threshold, further security procedures are performed.
This work has revealed several areas of improvements and further work. We are
working on adding a spatial dimension to our model as the physical location of a user
is often an important security metric. The resulting four dimensional matrix requires a
reworking of our clustering algorithm and modifications to the distance calculations.
As mentioned previously, we plan to develop an automatic method to allow the
temporal time frame to be dynamically set so as to show several characterizations of
the system. As the usage array is already clustered, we will be able to focus in on
certain areas that we know are hotspots for potential attacks, and tailor the system to
these dimensions. The clustering is what allows us to have this view of the system.
Acknowledgements
This work has been supported in part by US AFOSR under grant FA 955-08-1-0255.
We are thankful to Dr. Robert. L. Herklotz for his support, which made this work
possible.
References
1. Gordon, L. Loeb, M., Lucyshyn, W. and Richardson, R. Computer Security Institute.
Computer crime and security survey, 2006.
2. Fonseca, J., Vieira, M., and Madeira, H. Online detection of malicious data access using
DBMS auditing. In Proceedings of the 2008 ACM Symposium on Applied Computing. SAC
'08. ACM, New York, NY, 1013-1020, 2008.
3. Chung, C. Y., Gertz, M., Levitt, K. DEMIDS: a misuse detection system for database
systems. In integrity and internal Control information Systems: Strategic Views on the
Need For Control, Norwell, MA, 159-178, 2000.
4. Lee, S. Y., Low, W. L., and Wong, P. Y. Learning Fingerprints for a Database IDS. In
Proceedings of the 7th European Symposium on Research in Comp. Security. LNCS, vol.
2502. Springer-Verlag, London, 264-280, 2002.
5. Hu,Y. and Panda, B. Identification of Malicious Transactions in Database Systems. In
ideas,pp.329. 7
th
Intl. Database Engineering and Applications Symposium (IDEAS'03),
2003
6. McCormick W., Schweitzer P., White, T. Problem Decomposition and Data Reorganization
by a Clustering Technique, Operations Research. 993–1009, 1972.
7. Navathe, S., Ceri, S., Wiederhold, G., and Dou, J. Vertical partitioning algorithms for
database design. ACM Trans. Database Syst. 9, pp. 680-710, 1984.
8. Ramakrishnan, R. and Gehrke, J. Database Management Systems. 3rd. McGraw-Hill. 2002
101