Malicious users' transactions: Tackling insider threat

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper investigates the issues of malicious transactions by insiders in database systems. It establishes a number of rule sets to constrain the relationship between data items and transactions. A type of graph, called Predictive Dependency Graph, has been developed to determine data flow patterns among data items. This helps in foretelling which operation of a transaction has the ability to subsequently affect a sensitive data item. In addition, the paper proposes a mechanism to monitor suspicious insiders' activities and potential harm to the database. With the help of the Predictive DependencyGraphs, the presented model predicts and prevents potential damage caused by malicious transactions. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Li, W., Panda, B., & Yaseen, Q. (2012). Malicious users’ transactions: Tackling insider threat. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 211–222). https://doi.org/10.1007/978-3-642-30436-1_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free