Mitigation of malicious modifications by insiders in databases

  • Authors:
  • Harini Ragavan;Brajendra Panda

  • Affiliations:
  • Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas;Department of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, Arkansas

  • Venue:
  • ICISS'11 Proceedings of the 7th international conference on Information Systems Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Insider threat is considered as a serious issue in all organizations. Sophisticated insiders can override threat prevention tools and carry on their attacks with new techniques. One such technique which remains to be an advantage for insiders to attack a database is dependency relationship among data items. This paper investigates the ways by which an authorized insider detects dependencies in order to perform malicious write operations. The paper introduces a new term 'threshold', which defines the constraints and limits a write operation could take. Having threshold as the key factor, the paper proposes two different attack prevention systems which involve log and dependency graphs that aid in monitoring malicious activities and ultimately secure the data items in a database. Our proposed systems continuously monitor all the data items to prevent malicious operations, but the priority is to secure the most sensitive data items first since any damage to them can hinder the functions of critical applications that use the database. By prioritizing the data items, delay of the system is reduced in addition to mitigating insider threats arising from write operations.