Log In Sign Up

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems – A Brief Survey of Concepts and Approaches

by   Muhammad Imran Khan, et al.

One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information. Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks. This paper presents background concepts on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses by an insider to Database Management Systems (DBMS).


page 16

page 17


A Taxonomy of Malicious Traffic for Intrusion Detection Systems

With the increasing number of network threats it is essential to have a ...

An overview of Intrusion Detection and Prevention Systems

Cyber threats are increasing not only in their volume but also in their ...

Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

Deception technology has proven to be a sound approach against threats t...

Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection

Attackers have developed ever more sophisticated and intelligent ways to...

A closer look on Intrusion Detection System for web applications

Intrusion Detection System (IDS) is one of the security measures being u...

A Framework for Data-Driven Physical Security and Insider Threat Detection

This paper presents PS0, an ontological framework and a methodology for ...