A cloud and in-memory based two-tier architecture of a database protection system from insider attacks

3Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As a response of emerging insider attacks targeting on database, we are proposing architecture of database protection system from insider attacks. Existing pattern matching approach to detect insider attacks cannot provide perfect solution because of false positive and true negative ratios. Accordingly, we still need reasoning by a human at the last decision to declare that the insider is malicious or not using analysis on history of transaction logs performed by the insider. To construct a system with the consideration above, the system needs to satisfy following requirements: (1) effective monitoring and analysis on large amount of log data (2) scalable system depending on increase or decrease of the log data, and (3) prompt analysis even though the amount of the log data is large enough. We propose a two-tier, distributed, cloud, and in-memory computing based architecture. The proposed architecture brings several benefits such as managing a large amount of log data, distributing analysis workload over multiple nodes, being scalable on big log data, and supporting real-time analysis of big log data. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Moon, C. S., Chung, S., & Endicott-Popovsky, B. (2014). A cloud and in-memory based two-tier architecture of a database protection system from insider attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8267 LNCS, pp. 260–271). Springer Verlag. https://doi.org/10.1007/978-3-319-05149-9_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free