[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2699026.2699111acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

DetAnom: Detecting Anomalous Database Transactions by Insiders

Published: 02 March 2015 Publication History

Abstract

Database Management Systems (DBMSs) provide access control mechanisms that allow database administrators (DBA) to grant application programs access privileges to databases. However, securing the database alone is not enough, as attackers aiming at stealing data can take advantage of vulnerabilities in the privileged applications and make applications to issue malicious database queries. Therefore, even though the access control mechanism can prevent application programs from accessing the data to which the programs are not authorized, it is unable to prevent misuse of the data to which application programs are authorized for access. Hence, we need a mechanism able to detect malicious behavior resulting from previously authorized applications. In this paper, we design and implement an anomaly detection mechanism, DetAnom, that creates a profile of the application program which can succinctly represent the application's normal behavior in terms of its interaction (i.e., submission of SQL queries) with the database. For each query, the profile keeps a signature and also the corresponding constraints that the application program must satisfy to submit that query. Later in the detection phase, whenever the application issues a query, the corresponding signature and constraints are checked against the current context of the application. If there is a mismatch, the query is marked as anomalous. The main advantage of our anomaly detection mechanism is that we need neither any previous knowledge of application vulnerabilities nor any example of possible attacks to build the application profiles. As a result, our DetAnom mechanism is able to protect the data from attacks tailored to database applications such as code modification attacks, SQL injections, and also from other data-centric attacks as well. We have implemented our mechanism with a software testing technique called concolic testing and the PostgreSQL DBMS. Experimental results show that our profiling technique is close to accurate, and requires acceptable amount of time, and that the detection mechanism incurs low run-time overhead.

References

[1]
Cybersecurity watch survey: How bad is the insider threat? Technical report, Carnegie Mellon University, 2012. http://resources.sei.cmu.edu/asset_files/ Presentation/2013_017_101_57766.pdf.
[2]
E. Bertino. Data Protection from Insider Threats. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, San Rafael, 2012.
[3]
E. Bertino and G. Ghinita. Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS'11, pages 10--19, New York, NY, USA, 2011. ACM.
[4]
E. Bertino, A. Kamra, and J. P. Early. Profiling database application to detect sql injection attacks. In IEEE International Performance, Computing, and Communications Conference, IPCCC 2007, pages 449--458, April 2007.
[5]
A. Cheung, S. Madden, O. Arden, and A. C. Myers. Automatic partitioning of database applications. VLDB Endow., 5(11):1471--1482, July 2012.
[6]
M. Collins, D. M. Cappelli, T. Caron, R. F. Trzeciak, and A. P. Moore. Spotlight on: Programmers as malicious insiders (updated and revised). Technical report, Carnegie Mellon University, 2013. http://resources.sei.cmu.edu/asset_files/WhitePaper/2013_019_001_85232.pdf.
[7]
A. Dasgupta, V. Narasayya, and M. Syamala. A static analysis framework for database applications. In Proceedings of the 2009 IEEE International Conference on Data Engineering, ICDE'09, pages 1403--1414, Washington, DC, USA, 2009. IEEE Computer Society.
[8]
M. Emmi, R. Majumdar, and K. Sen. Dynamic test input generation for database applications. In Proceedings of the 2007 International Symposium on Software Testing and Analysis, ISSTA'07, pages 151--162, New York, NY, USA, 2007. ACM.
[9]
D. Gao, M. K. Reiter, and D. Song. Gray-box extraction of execution graphs for anomaly detection. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, pages 318{329, New York, NY, USA, 2004. ACM.
[10]
J. T. Giffin, S. Jha, and B. P. Miller. Efficient context-sensitive intrusion detection. In Proceedings of the 11th Annual Network and Distributed System Security Symposium NDSS, 2004.
[11]
C. Huth and R. Rueffe. Components and considerations in building an insider threat program. Technical report, Carnegie Mellon University, 2013. http://resources.sei.cmu.edu/asset_files/Webinar/2013_018_101_69083.pdf.
[12]
S. Y. Lee, W. L. Low, and P. Y. Wong. Learning fingerprints for a database intrusion detection system. In Proceedings of the 7th European Symposium on Research in Computer Security, ESORICS'02, pages 264--280, London, UK, UK, 2002. Springer-Verlag.
[13]
R. Majumdar and K. Sen. Hybrid concolic testing. In Proceedings of the 29th International Conference on Software Engineering, ICSE 2007, pages 416--426, May 2007.
[14]
PostgreSQL Global Development Group. PostgreSQL-9.1.8. http://www.postgresql.org/docs/9.1/static/release-9--1--8.html.
[15]
K. Ramachandra and S. Sudarshan. Holistic optimization by prefetching query results. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD'12, pages 133--144, New York, NY, USA, 2012. ACM.
[16]
T. Reps, T. Ball, M. Das, and J. Larus. The use of program profiling for software maintenance with applications to the year 2000 problem. In Proceedings of the 6th European SOFTWARE ENGINEERING Conference Held Jointly with the 5th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC'97/FSE-5, pages 432--449, New York, NY, USA, 1997. Springer-Verlag New York, Inc.
[17]
A. Sallam and E. Bertino. Poster: Protecting against data exfiltration insider attacks through application programs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS'14, pages 1493--1495, New York, NY, USA, 2014. ACM.
[18]
K. Sen and G. Agha. Cute and jcute: Concolic unit testing and explicit path model-checking tools. In Proceedings of the 18th International Conference on Computer Aided Verification, CAV'06, pages 419--423, Berlin, Heidelberg, 2006. Springer-Verlag.
[19]
K. Sen, D. Marinov, and G. Agha. Cute: A concolic unit testing engine for c. In Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-13, pages 263--272, New York, NY, USA, 2005. ACM.
[20]
F. Valeur, D. Mutz, and G. Vigna. A learning-based approach to the detection of sql attacks. In Proceedings of the Second International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'05, pages 123--140, Berlin, Heidelberg, 2005. Springer-Verlag.
[21]
R. Vallee-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - a java bytecodeoptimization framework. In Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON'99, pages 13--. IBM Press, 1999.
[22]
D. Wagner and D. Dean. Intrusion detection via static analysis. In Proceedings of the IEEE Symposium on Security and Privacy, S&P 2001, pages 156--168, 2001.

Cited By

View all
  • (2024)DBPrompt: A Database Anomaly Operation Detection and Analysis via Prompt LearningAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5603-2_29(357-368)Online publication date: 1-Aug-2024
  • (2023)UDAD: An Accurate Unsupervised Database Anomaly Detection Method2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253824(109-115)Online publication date: 17-Nov-2023
  • (2022)Unsupervised Contextual Anomaly Detection for Database SystemsProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517861(788-802)Online publication date: 10-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
March 2015
362 pages
ISBN:9781450331913
DOI:10.1145/2699026
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 March 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. application profile
  3. database
  4. insider attacks
  5. sql injection

Qualifiers

  • Research-article

Funding Sources

  • Department of Homeland Security (DHS)

Conference

CODASPY'15
Sponsor:

Acceptance Rates

CODASPY '15 Paper Acceptance Rate 19 of 91 submissions, 21%;
Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)DBPrompt: A Database Anomaly Operation Detection and Analysis via Prompt LearningAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5603-2_29(357-368)Online publication date: 1-Aug-2024
  • (2023)UDAD: An Accurate Unsupervised Database Anomaly Detection Method2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253824(109-115)Online publication date: 17-Nov-2023
  • (2022)Unsupervised Contextual Anomaly Detection for Database SystemsProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517861(788-802)Online publication date: 10-Jun-2022
  • (2022)Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern miningCluster Computing10.1007/s10586-022-03622-225:6(3937-3959)Online publication date: 1-Jun-2022
  • (2022)Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and ApproachesEmerging Information Security and Applications10.1007/978-3-030-93956-4_11(178-197)Online publication date: 12-Jan-2022
  • (2021)A Fine-grained Approach for Anomaly Detection in File System Accesses with Enhanced Temporal User ProfilesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2954507(1-1)Online publication date: 2021
  • (2020)Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS FrameworkFrontiers in Big Data10.3389/fdata.2020.000113Online publication date: 5-May-2020
  • (2020)An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs2020 IEEE 36th International Conference on Data Engineering (ICDE)10.1109/ICDE48307.2020.00030(265-276)Online publication date: Apr-2020
  • (2020)Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomaliesProcedia Computer Science10.1016/j.procs.2020.07.048175(331-339)Online publication date: 2020
  • (2020)Role-Based Access Classification: Evaluating the Performance of Machine Learning AlgorithmsTransactions on Large-Scale Data- and Knowledge-Centered Systems XLIII10.1007/978-3-662-62199-8_1(1-39)Online publication date: 13-Aug-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media