DocumentCode :
3710401
Title :
Anomaly detection of access patterns in database
Author :
Jong-hyuk Roh;Sung-Hun Lee;Soohyung Kim
Author_Institution :
Cyber Security Research Division, ETRI, Daejeon, Korea
fYear :
2015
Firstpage :
1112
Lastpage :
1115
Abstract :
Data security has a critical role in the larger context of information and system security. In this paper, we propose the anomaly detection system for securing database. Our approach is based on analyzing the user´s access pattern stored in database log and detecting the anomalous access event. We consider three methods for this, user pattern analysis, machine learning analysis, and rule-based access control. Our experimental evaluation on both real and virtual database shows that our approaches work well.
Keywords :
"Access control","Pattern analysis","Monitoring","IP networks","Database systems","Support vector machines"
Publisher :
ieee
Conference_Titel :
Information and Communication Technology Convergence (ICTC), 2015 International Conference on
Type :
conf
DOI :
10.1109/ICTC.2015.7354751
Filename :
7354751
Link To Document :
بازگشت