Mitigating insider threat on database integrity

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We have developed a model to predict and prevent potential damage caused by malicious transactions in a database system. The model consists of a number of rules sets that constrain the relationships among data items and transactions. It uses a graph called Predictive Dependency Graph to determine data flow patterns among data items. The model offers a mechanism to monitor suspicious insiders activities and potential harm to the database. Through simulation we have tested the effectiveness of the model. The results show the effectiveness of the proposed model in predicting damage that can occur by malicious transactions. © Springer-Verlag 2012.

Cite

CITATION STYLE

APA

Li, W., Panda, B., & Yaseen, Q. (2012). Mitigating insider threat on database integrity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7671 LNCS, pp. 223–237). https://doi.org/10.1007/978-3-642-35130-3_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free