Enhanced insider threat detection model that increases data availability

  • Authors:
  • Qussai Yaseen;Brajendra Panda

  • Affiliations:
  • Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville, AR;Computer Science and Computer Engineering Department, University of Arkansas, Fayetteville, AR

  • Venue:
  • ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper demonstrates how to prevent or mitigate insider threats in relational databases. It shows how different order of accesses to the same data items may pose different levels of threat. Moreover, it states the conditions that are required to regard a data item as expired. In addition, it introduces the two different methods of executing insiders' tasks, and how to prevent insider threat in those. The models presented in this paper organize accesses to data items in a particular sequence so that the availability of data items is maximized and the expected threat is minimized to the lowest level. Furthermore, it determines when to give an insider an incorrect but acceptable value of a risky data item in order to prevent a possible threat.