Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems – A Brief Survey of Concepts and Approaches

11/04/2020
by   Muhammad Imran Khan, et al.
0

One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information. Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks. This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses by an insider to Database Management Systems (DBMS).

READ FULL TEXT

page 16

page 17

research
06/09/2018

A Taxonomy of Malicious Traffic for Intrusion Detection Systems

With the increasing number of network threats it is essential to have a ...
research
03/19/2019

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital curr...
research
04/19/2020

An overview of Intrusion Detection and Prevention Systems

Cyber threats are increasing not only in their volume but also in their ...
research
04/08/2021

Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

Deception technology has proven to be a sound approach against threats t...
research
03/20/2023

TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking

IEEE 802.1 Time-sensitive Networking (TSN) standards are envisioned to r...
research
02/27/2023

AI-Driven Container Security Approaches for 5G and Beyond: A Survey

The rising use of microservices based software deployment on the cloud l...
research
08/16/2018

Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection

Attackers have developed ever more sophisticated and intelligent ways to...

Please sign up or login with your details

Forgot password? Click here to reset