2022
DOI: 10.1007/978-3-030-93956-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches

Abstract: One of the data security and privacy concerns is of insider threats, where legitimate users of the system abuse the access privileges they hold. The insider threat to data security means that an insider steals or leaks sensitive personal information.Database Intrusion detection systems, specifically behavioural-based database intrusion detection systems, have been shown effective in detecting insider attacks.This paper presents background concepts on database intrusion detection systems in the context of detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 56 publications
(61 reference statements)
0
1
0
Order By: Relevance
“…When a match is identified, the system triggers an alert or takes predefined actions, such as blocking access or notifying security personnel. The authors of [80], [81]. suggests that while signature-based detection is effective in recognizing well-established and documented insider threats, its limitation lies in its inability to identify novel or previously unseen malicious activities, as it heavily relies on historical data and known attack patterns.…”
Section: ) Signature-based Detection Methodsmentioning
confidence: 99%
“…When a match is identified, the system triggers an alert or takes predefined actions, such as blocking access or notifying security personnel. The authors of [80], [81]. suggests that while signature-based detection is effective in recognizing well-established and documented insider threats, its limitation lies in its inability to identify novel or previously unseen malicious activities, as it heavily relies on historical data and known attack patterns.…”
Section: ) Signature-based Detection Methodsmentioning
confidence: 99%