Predicting and Preventing Insider Threat in Relational Database Systems
Abstract
This paper investigates the problem of insider
threat in relational database systems. It defines various types of
dependencies as well as constraints on dependencies that may be used by
insiders to infer unauthorized information. Furthermore, it introduces
the Constraint and Dependency Graph (CDG), and the Dependency Matrix
that are used to represent dependencies and constraints on them.
Furthermore, it presents an algorithm for constructing insiders
knowledge graph, which shows the knowledgebase of insiders. In addition,
the paper introduces the Threat Prediction Graph (TPG) to predict and
prevent insider threat.
Domains
Digital Libraries [cs.DL]Origin | Files produced by the author(s) |
---|
Loading...