DocumentCode :
2411699
Title :
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention
Author :
Yaseen, Qussai ; Panda, Biplab
Author_Institution :
Dept. of Comput. Sci. & Comput. Eng., Univ. of Arkansas, Fayetteville, AR, USA
fYear :
2010
fDate :
20-22 Aug. 2010
Firstpage :
849
Lastpage :
856
Abstract :
This paper investigates the problem of malicious modifications by insiders in relational databases. It presents an algorithm that shows how to construct insiders´ Modification Graphs, which demonstrate the authorized and unauthorized data items in which insiders can make changes. Two methods are provided to prevent modification attacks. The first method prevents attacks by hiding dependencies between data items. The second method prevents attacks by denying write access to some data items. We present the cut algorithm that determines which dependencies should be hidden to prevent modification attacks on sensitive data items. In addition, we use modification graphs to determine which write accesses should be denied in order to prevent such attacks.
Keywords :
graph theory; relational databases; security of data; cut algorithm; malicious modification attacks; modification graphs; relational databases; unauthorized data items; Clustering algorithms; Collaboration; Organizations; Petri nets; Relational databases; Security; Sensitivity; database; dependencies; dependency graph; insider threat; knowledge graph; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Social Computing (SocialCom), 2010 IEEE Second International Conference on
Conference_Location :
Minneapolis, MN
Print_ISBN :
978-1-4244-8439-3
Electronic_ISBN :
978-0-7695-4211-9
Type :
conf
DOI :
10.1109/SocialCom.2010.128
Filename :
5591448
Link To Document :
بازگشت