CISUC

Online Detection of Malicious Data Access Using DBMS Auditing

Authors

Subject

Instrusion Detection in DBMS

Conference

23rd Annual ACM Symposium on Applied Computing (ACM SAC 2008), March 2008


Cited by

Year 2013 : 2 citations

 Abhijeet Sartape, Vasgi B. P., "Data-Base Security Using Different Techniques: A Survey", International Journal of Computer Trends and Technology (IJCTT), Vol. 4 Issue 4, April 2013.

 Rita M. Barrios, "A Multi-Leveled Approach to Intrusion Detection and the Insider Threat", Journal of Information Security, 4, January 2013.

Year 2012 : 3 citations

 Asaf Shabtai, Yuval Elovici, Lior Rokach, "A Survey of Data Leackage Detection and Prevention Solutions", Springer Briefs in Computer Science, 2012.

 Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012.

 1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012.

Year 2011 : 2 citations

 A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011.

 1. J. Harold Pardue, Priya Patidar, “Threats to Healthcare Data: A Threat Tree for Risk Assessment”, Issues in Information Systems, Volume XII, No. 1, pp. 106-113, 2011.

Year 2010 : 4 citations

 Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010.

 1. Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu Upadhyaya, “A data-centric approach to insider attack detection in database systems”, 13th international conference on Recent advances in intrusion detection, RAID'10, Ottawa, Ontario, Canada, September 15-17, 2010.

 2. Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, and Yuval Elovici, “Detecting data misuse by applying context-based data linkage”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010.

 3. Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici, “M-score: estimating the potential damage of data leakage incident by assigning misuseability weight”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010.

Year 2009 : 4 citations

 Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009.

 1. Hennayake M. Bandara, “Security Features in Oracle Database Management System”, MSc Thesis, California State University, Sacramento, USA, 2009.

 2. Sunu Mathew, “Techniques for Cyber-Attack Comprehension through Analysis of Application Level Data”, PhD Thesis, State University of New York at Buffalo, USA, July 2009.

 3. Platt, A., Mengle, S. S., Goharian, N., “Improving classification based off-topic search detection via category relationships”, 2009 ACM Symposium on Applied Computing, SAC '09, Honolulu, Hawaii, USA, March 9-12, 2009.

Year 2008 : 1 citations

 1. Jagdish Halde, "SQL Injection analysis, Detection and Prevention", MSc Thesis, Department of Computer Science, San Jose State University, San Jose, CA, USA, 2008.