[CARTE][B] Data leakage detection/prevention solutions

A Shabtai, Y Elovici, L Rokach, A Shabtai, Y Elovici… - 2012 - Springer
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …

A data-centric approach to insider attack detection in database systems

S Mathew, M Petropoulos, HQ Ngo… - Recent Advances in …, 2010 - Springer
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …

A survey on data security in data warehousing: Issues, challenges and opportunities

RJ Santos, J Bernardino… - 2011 IEEE EUROCON …, 2011 - ieeexplore.ieee.org
Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical
business information, making them an appealing target for malicious inside and outside …

Anomaly detection for database systems

P Mork, A Chapman, K Samuel, I Vayndiner… - US Patent …, 2013 - Google Patents
Methods, systems and computer program products for detect ing anomalies for a database
system are provided. A method may include extracting workload features from a query opti …

Anomaly detection in large databases using behavioral patterning

H Mazzawi, G Dalal, D Rozenblatz… - 2017 IEEE 33rd …, 2017 - ieeexplore.ieee.org
We present a novel approach for detecting malicious user activity in databases. Specifically,
we propose a new machine learning algorithm for detecting attacks such as a stolen user …

Robustness testing techniques and tools

Z Micskei, H Madeira, A Avritzer, I Majzik… - … and evaluation of …, 2012 - Springer
Robustness is an attribute of resilience that measures the behaviour of the system under
non-standard conditions. Robustness is defined as the degree to which a system operates …

A survey on database intrusion detection: approaches, challenges and application

R **dal, I Singh - International Journal of Intelligent …, 2019 - inderscienceonline.com
Databases store vital information of an organisation and are therefore integral for its efficient
working. This necessitates the establishment of database intrusion detection systems …

A multi-leveled approach to intrusion detection and the insider threat

RM Barrios - Journal of Information Security, 2013 - scirp.org
When considering Intrusion Detection and the Insider Threat, most researchers tend to focus
on the network architecture rather than the database which is the primary target of data theft …

Data Leakage Prevention and Detection in Digital Configurations: А Survey

S Syarova, S Toleva-Stoimenova, A Kirkov… - … . Proceedings of the …, 2024 - journals.ru.lv
As a result of the development of information and communication technologies (ICT) and
Internet electronic interaction at all levels in the organizations and the use of various …

M-score: estimating the potential damage of data leakage incident by assigning misuseability weight

A Harel, A Shabtai, L Rokach, Y Elovici - … of the 2010 ACM workshop on …, 2010 - dl.acm.org
Over the past few years data leakage and data misuse have become a major concern for
organizations. A data leakage or data misuse incident can damage an organization's …