Predicting and preventing insider threat in relational database systems

  • Authors:
  • Qussai Yaseen;Brajendra Panda

  • Affiliations:
  • Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR;Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, AR

  • Venue:
  • WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper investigates the problem of insider threat in relational database systems. It defines various types of dependencies as well as constraints on dependencies that may be used by insiders to infer unauthorized information. Furthermore, it introduces the Constraint and Dependency Graph (CDG), and the Dependency Matrix that are used to represent dependencies and constraints on them. Furthermore, it presents an algorithm for constructing insiders knowledge graph, which shows the knowledgebase of insiders. In addition, the paper introduces the Threat Prediction Graph (TPG) to predict and prevent insider threat.