作者:
基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
When considering Intrusion Detection and the Insider Threat, most researchers tend to focus on the network architecture rather than the database which is the primary target of data theft. It is understood that the network level is adequate for many intrusions where entry into the system is being sought however it is grossly inadequate when considering the database and the authorized insider. Recent writings suggest that there have been many attempts to address the insider threat phenomena in regards to database technologies by the utilization of detection methodologies, policy management systems and behavior analysis methods however, there appears to be a lacking in the development of adequate solutions that will achieve the level of detection that is required. While it is true that Authorization is the cornerstone to the security of the database implementation, authorization alone is not enough to prevent the authorized entity from initiating malicious activities in regards to the data stored within the database. Behavior of the authorized entity must also be considered along with current data access control policies. Each of the previously mentioned approaches to intrusion detection at the database level has been considered individually, however, there has been limited research in producing a multileveled approach to achieve a robust solution. The research presented outlines the development of a detection framework by introducing a process that is to be implemented in conjunction with information requests. By utilizing this approach, an effective and robust methodology has been achieved that can be used to determine the probability of an intrusion by the authorized entity, which ultimately address the insider threat phenomena at its most basic level.
推荐文章
Prospectivity modeling of porphyry copper deposits: recognition of efficient mono- and multi-element
Geochemical signature
Concentration–area (C–A) fractal
Principal component analysis (PCA)
Student's t-value
Fuzzy mineral prospectivity modeling(MPM)
Prediction–area (P–A) plot
Using electrogeochemical approach to explore buried gold deposits in an alpine meadow-covered area
Electrogeochemistry
Buried mineral deposit
Ideal anomaly model
Alpine-meadow covered
Ihunze
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
来源期刊 信息安全(英文) 学科 医学
关键词 BAYESIAN BELIEF Network Database INSIDER THREAT INTRUSION Detection
年,卷(期) 2013,(1) 所属期刊栏目
研究方向 页码范围 54-65
页数 12页 分类号 R73
字数 语种
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2013(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
研究主题发展历程
节点文献
BAYESIAN
BELIEF
Network
Database
INSIDER
THREAT
INTRUSION
Detection
研究起点
研究来源
研究分支
研究去脉
引文网络交叉学科
相关学者/机构
期刊影响力
信息安全(英文)
季刊
2153-1234
武汉市江夏区汤逊湖北路38号光谷总部空间
出版文献量(篇)
230
总下载数(次)
0
总被引数(次)
0
论文1v1指导