Despite protected by firewalls and network security systems, databases are vulnerable to attacks especially when the perpetrators are from within the organization and have authorized access to these systems. Detecting their malicious activities is difficult as each database has its own set of unique usage activities and the generic exploitation avoidance rules are usually not applicable. This paper proposes a novel method to improve the security of a database by using machine learning to learn the user behaviour unique to a database environment and apply that learning to detect anomalous user activities through the analysis of sequences of user session data. Once these suspicious users are detected, their privileges are systematically suppr...
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In...
Data breach has become a big problem for organizations, as the consequences can range from loss of r...
The paper presents an approach based on machine learning to refine attribute-based access control p...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
Information is valuable asset of any organization which is stored in databases. Data in such databas...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Database objects access by users has always been controlled in individual database or through enterp...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of...
Despite various access control approaches, databases are still vulnerable to intruders who are able ...
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In...
Data breach has become a big problem for organizations, as the consequences can range from loss of r...
The paper presents an approach based on machine learning to refine attribute-based access control p...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
Information is valuable asset of any organization which is stored in databases. Data in such databas...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Database objects access by users has always been controlled in individual database or through enterp...
The mitigation of insider threats against databases is a challenging problem since insiders often ha...
One of the biggest reasons that lead to violations of the security of companies’ services is obtaini...
Insider attacks aiming at stealing data are highly common, according to recent studies, and they are...
A considerable effort has been recently devoted to the development of Database Management Systems (D...
Access control systems are nowadays the first line of defence of modern IT systems. However, their e...
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of...
Despite various access control approaches, databases are still vulnerable to intruders who are able ...
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In...
Data breach has become a big problem for organizations, as the consequences can range from loss of r...
The paper presents an approach based on machine learning to refine attribute-based access control p...