RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Monitoring Insider Attack in Database Systems Using Multiple-Criteria Query Statement Probabilities

        Sky Cheolmin Moon,Sam Chung,Barbara Endicott-Popovsky 한국엔터프라이즈아키텍처학회 2015 정보기술아키텍처연구 Vol.12 No.3

        Any malicious attack on the database systems performed by an entrusted group of peoplehaving authorized access is called database insider attack. Even though the insider attack has beenlively researched, it is still far from the practical application. We propose a new approach to improvethe limitations in the previous researches. This approach has four objectives: (1) Multi-PreprocessingAlgorithms to observe a query in multiple perspectives (2) Query Probabilities Based Database InsiderMonitoring Methodology based upon Markov Mathematical Model to record insider’s behavioralpatterns with query and query transition probabilities (3) Query Probabilities Time Series Graph tocreate metrics to monitor the insider’s behavior in order to predict insider attack, and (4) Multi-CriteriaQuery Probabilities Based Insider Attack Monitoring System containing the (1)–(3). The results fromthe evaluation show that the proposed system overcomes the limitations and is also capable to monitorinsider’s behavioral data while the database is being updated.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼