[BUKU][B] Data leakage detection/prevention solutions

A Shabtai, Y Elovici, L Rokach, A Shabtai, Y Elovici… - 2012 - Springer
Abstract According to the Forrester Wave report [Raschke, 2008], most early DLP solutions
focused on finding sensitive data as they left the organizational network by monitoring data …

A data-centric approach to insider attack detection in database systems

S Mathew, M Petropoulos, HQ Ngo… - Recent Advances in …, 2010 - Springer
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …

Approaches and challenges in database intrusion detection

RJ Santos, J Bernardino, M Vieira - ACM Sigmod Record, 2014 - dl.acm.org
Databases often support enterprise business and store its secrets. This means that securing
them from data damage and information leakage is critical. In order to deal with intrusions …

DoubleGuard: Detecting intrusions in multitier web applications

M Le, A Stavrou, BBH Kang - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Internet services and applications have become an inextricable part of daily life, enabling
communication and the management of personal information from anywhere. To …

Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery

H Zhang, DD Yao, N Ramakrishnan - … of the 9th ACM symposium on …, 2014 - dl.acm.org
Studies show that a significant portion of networked computers are infected with stealthy
malware. Infection allows remote attackers to control, utilize, or spy on victim machines …

Anomalous query access detection in RBAC-administered databases with random forest and PCA

CA Ronao, SB Cho - Information Sciences, 2016 - Elsevier
Relational databases are created for the purpose of handling and organizing sensitive data
for organizations as well as for individuals. Although database security mechanisms and …

A survey on data security in data warehousing: Issues, challenges and opportunities

RJ Santos, J Bernardino… - 2011 IEEE EUROCON …, 2011 - ieeexplore.ieee.org
Data Warehouses (DWs) are the enterprise's most valuable assets in what concerns critical
business information, making them an appealing target for malicious inside and outside …

Anomaly detection in large databases using behavioral patterning

H Mazzawi, G Dalal, D Rozenblatz… - 2017 IEEE 33rd …, 2017 - ieeexplore.ieee.org
We present a novel approach for detecting malicious user activity in databases. Specifically,
we propose a new machine learning algorithm for detecting attacks such as a stolen user …

Learning SQL for database intrusion detection using context-sensitive modelling

C Bockermann, M Apel, M Meier - … on Detection of Intrusions and Malware …, 2009 - Springer
Modern multi-tier application systems are generally based on high performance database
systems in order to process and store business information. Containing valuable business …

Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining

R **dal, I Singh - Cluster Computing, 2022 - Springer
Database systems have become imperative for organisations around the world to store and
analyse information. However, as one of the ramifications of a massive surge in cloud-based …