Database anomalous activities: Detection and quantification

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2 Downloads (Pure)

Abstract

The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns \emph{normal} user behavior, in terms of database activities, and detects anomalies as deviation from such behavior. In addition, our approach explicitly indicates the root cause of an anomaly. Finally, the framework assesses the severity of data leakages based on the sensitivity of the disclosed data. Keywords: Data Misuse, Data Leakage, Database Activity Monitoring, Data Leakage Quanti¿cation.
Original languageEnglish
Title of host publicationSECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013)
PublisherSCITEPRESS-Science and Technology Publications, Lda.
Pages603-608
ISBN (Print)978-989-8565-73-0
Publication statusPublished - 2013
Eventconference; 10th International Conference on Security and Cryptography; 2013-07-29; 2013-07-31 -
Duration: 29 Jul 201331 Jul 2013

Conference

Conferenceconference; 10th International Conference on Security and Cryptography; 2013-07-29; 2013-07-31
Period29/07/1331/07/13
Other10th International Conference on Security and Cryptography

Fingerprint Dive into the research topics of 'Database anomalous activities: Detection and quantification'. Together they form a unique fingerprint.

  • Cite this

    Costante, E., Vavilis, S., Etalle, S., Petkovic, M., & Zannone, N. (2013). Database anomalous activities: Detection and quantification. In SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013) (pp. 603-608). SCITEPRESS-Science and Technology Publications, Lda..