weighted average of the sensitivities of all the inferred
instances. For example, the sensitivity of information
about Paracetamol is calculated as 34, while the sen-
sitivity of Tamiflu is explicitly set to 60. By utilizing
such annotated data model we i) map the data values
accessed by the anomalous query to the data model;
and ii) measure the severity of the anomaly.
Once an anomaly is detected and evaluated, it
has to be analyzed by a security officer to determine
whether it is a real or a false alarm. In the first case, he
can take the necessary actions, while in case of a false
alarm a feedback is sent back to the detection model,
so that the system can automatically learn from its
own mistakes and thus reduce the false positive rate.
Note that the proposed solution is not only use-
ful for leakage detection, but also for accountability
purposes. Moreover, the monitoring and analysis of
how data is actually accessed can help in discovering
access patterns that are allowed but undesired; in this
case security officers might act on the access policies
to solve the problem.
5 CONCLUSIONS
Prompt detection of data leakages is essential to re-
duce the damages they can cause to an organization.
Data leakages can be detected by observing anomalies
in the way data is accessed within the organization
perimeter. Focusing the analysis on database activi-
ties improves the chances of detecting the leakage at
a very early stage. In this paper we proposed a DAM
solution to detect anomalous database activities and to
quantify them according to the sensitivity of the data
leaked.
Our aim is to further develop the proposed frame-
work, and to validate it by the means of extensivetests
on real data, coming from different operational envi-
ronments. The main goal of the validation phase is
to show that the system is able to detect a wide range
of data leakage attacks, while keeping a low rate of
false positive. We are testing our approach in collab-
oration with an industrial partner in the area of service
management. Preliminary results confirm that our ap-
proach improves performance, in terms of false pos-
itive, if compared with other solutions on the same
dataset.
ACKNOWLEDGEMENTS
This work has been partially funded by the THeCS
project in the Dutch National COMMIT program.
REFERENCES
Bockermann, C., Apel, M., and Meier, M. (2009). Learning
SQL for database intrusion detection using context-
sensitive modelling. In Detection of Intrusions and
Malware, and Vulnerability Assessment, LNCS 5587,
pages 196–205. Springer.
Carvalho, V. R. and Cohen, W. W. (2007). Preventing infor-
mation leaks in email. In Proceedings of SIAM Inter-
national Conference on Data Mining.
Fonseca, J., Vieira, M., and Madeira, H. (2007). Integrated
intrusion detection in databases. In Dependable Com-
puting, LNCS 4746, pages 198–211. Springer.
Gafny, M., Shabtai, A., Rokach, L., and Elovici, Y. (2010).
Detecting data misuse by applying context-based data
linkage. In Proceedings of Workshop on Insider
Threats, pages 3–12. ACM.
Gessiou, E., Vu, Q. H., and Ioannidis, S. (2011). IRILD: an
Information Retrieval based method for Information
Leak Detection. In Proceedings of European Con-
ference on Computer Network Defense, pages 33–40.
IEEE.
G´omez-Hidalgo, J. M., Martın Abreu, J. M., Nieves, J., San-
tos, I., Brezo, F., and Bringas, P. G. (2010). Data leak
prevention through named entity recognition. In Pro-
ceedings of International Conference on Social Com-
puting, pages 1129–1134. IEEE.
Hart, M., Manadhata, P., and Johnson, R. (2011). Text clas-
sification for data loss prevention. In Privacy Enhanc-
ing Technologies, LNCS 6794, pages 18–37. Springer.
Information Age (2012). New EU data laws to include 24hr
breach notification.
Kamra, A., Terzi, E., and Bertino, E. (2007). Detecting
anomalous access patterns in relational databases. The
VLDB Journal, 17(5):1063–1077.
Koch, R. (2011). Towards next-generation intrusion detec-
tion. In Proceedings of International Conference on
Cyber Conflict, pages 1–18. IEEE.
Mathew, S. and Petropoulos, M. (2010). A data-centric
approach to insider attack detection in database sys-
tems. In Recent Advances in Intrusion Detection,
LNCS 6307, pages 382–401. Springer.
Roichman, A. and Gudes, E. (2008). DIWeDa - Detect-
ing Intrusions in Web Databases. In Data and Appli-
cations Security XXII, LNCS 5094, pages 313–329.
Springer.
Santos, R., Bernardino, J., Vieira, M., and Rasteiro, D.
(2012). Securing Data Warehouses from Web-Based
Intrusions. In Web Information Systems Engineering,
LNCS 7651, pages 681–688. Springer.
Shabtai, A., Elovici, Y., and Rokach, L. (2012). A Survey
of Data Leakage Detection and Prevention Solutions.
SpringerBriefs in Computer Science. Springer.
Spitzner, L. (2003). Honeypots: Catching the insider threat.
In Proceedings of Computer Security Applications
Conference, pages 170–179. IEEE.
Wu, G., Osborn, S., and Jin, X. (2009). Database intrusion
detection using role profiling with role hierarchy. In
Secure Data Management, LNCS 5776, pages 33–48.
Springer.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
608