[CARTE][B] Data leakage detection/prevention solutions
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …
focused on finding sensitive data as they left the organizational network by monitoring data …
A data-centric approach to insider attack detection in database systems
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …
Authorized users may abuse legitimate privileges to masquerade as other users or to …
A survey on data security in data warehousing: Issues, challenges and opportunities
RJ Santos, J Bernardino… - 2011 IEEE EUROCON …, 2011 - ieeexplore.ieee.org
Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical
business information, making them an appealing target for malicious inside and outside …
business information, making them an appealing target for malicious inside and outside …
Anomaly detection for database systems
P Mork, A Chapman, K Samuel, I Vayndiner… - US Patent …, 2013 - Google Patents
Methods, systems and computer program products for detect ing anomalies for a database
system are provided. A method may include extracting workload features from a query opti …
system are provided. A method may include extracting workload features from a query opti …
Anomaly detection in large databases using behavioral patterning
H Mazzawi, G Dalal, D Rozenblatz… - 2017 IEEE 33rd …, 2017 - ieeexplore.ieee.org
We present a novel approach for detecting malicious user activity in databases. Specifically,
we propose a new machine learning algorithm for detecting attacks such as a stolen user …
we propose a new machine learning algorithm for detecting attacks such as a stolen user …
Robustness testing techniques and tools
Robustness is an attribute of resilience that measures the behaviour of the system under
non-standard conditions. Robustness is defined as the degree to which a system operates …
non-standard conditions. Robustness is defined as the degree to which a system operates …
A survey on database intrusion detection: approaches, challenges and application
Databases store vital information of an organisation and are therefore integral for its efficient
working. This necessitates the establishment of database intrusion detection systems …
working. This necessitates the establishment of database intrusion detection systems …
A multi-leveled approach to intrusion detection and the insider threat
RM Barrios - Journal of Information Security, 2013 - scirp.org
When considering Intrusion Detection and the Insider Threat, most researchers tend to focus
on the network architecture rather than the database which is the primary target of data theft …
on the network architecture rather than the database which is the primary target of data theft …
Data Leakage Prevention and Detection in Digital Configurations: А Survey
S Syarova, S Toleva-Stoimenova, A Kirkov… - … . Proceedings of the …, 2024 - journals.ru.lv
As a result of the development of information and communication technologies (ICT) and
Internet electronic interaction at all levels in the organizations and the use of various …
Internet electronic interaction at all levels in the organizations and the use of various …
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight
Over the past few years data leakage and data misuse have become a major concern for
organizations. A data leakage or data misuse incident can damage an organization's …
organizations. A data leakage or data misuse incident can damage an organization's …