The detection model of malignant query and personal information leakage based on log analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, G.-Y. | - |
dc.contributor.author | Jung, K.-J. | - |
dc.contributor.author | Shin, Y. | - |
dc.contributor.author | Kim, S. | - |
dc.contributor.author | Kim, J.-B. | - |
dc.date.available | 2018-05-09T08:35:41Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2015 | - |
dc.identifier.issn | 1975-0080 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/9708 | - |
dc.description.abstract | Many behaviors happen in information protection control, threatening from unauthorized change, destruction, and exposure to integrity, confidentiality, and availability of database, which is the final and core object of control. Like this it approaches database through numerous paths like many applications and home pages and execute query which search, modify, and delete the data. Some of it executes normal queries, but sometimes it maliciously executes the queries for leakage of information, and gives load to database server by executing the query which uses large amount of hardware resources. Traditionally it has limits, using only to find the reason for the problems, such as malignant queries, by collecting security log. Analyzing malignant queries and personal information leakage in diversified views through multidimensional analysis of data is necessary in order to use security log in more various ways. Therefore, this treatise is going to design multidimensional analysis modeling and suggest the technology to analyze in diversified views as an application plan of existing security log so that we can detect malignant queries and personal information leakage through security log analysis. We established the standard of analysis as follows for various analyses. First, we made linkage analysis available, which we cannot know with only simple history search, through analysis of database examination history. Second, we analyze if it repeatedly approached important table for a long time through detection of abnormal pattern or long term leakage via database abnormal access analysis. Third, we understood the flow of elements and data which weigh impact on specific database assets through database impact analysis and made analysis of database assets correlation and data flow analysis available. For analysis this treatise analyzed the log collected by using OLAP tools and used experiment data and operation data in order to verify the efficiency of database security log analysis technology suggested. Also we showed that the analysis method suggested by this treatise is excellent in availability and credibility in detection of malignant queries and personal information leakage, by comparing traditional data analysis method and the analysis method suggested by this treatise. © 2015 SERSC. | - |
dc.publisher | Science and Engineering Research Support Society | - |
dc.relation.isPartOf | International Journal of Multimedia and Ubiquitous Engineering | - |
dc.subject | Database systems | - |
dc.subject | Error detection | - |
dc.subject | Information analysis | - |
dc.subject | Pattern recognition | - |
dc.subject | Query languages | - |
dc.subject | Query processing | - |
dc.subject | Data analysis methods | - |
dc.subject | Database security | - |
dc.subject | Hardware resources | - |
dc.subject | Information protection | - |
dc.subject | Log analysis | - |
dc.subject | Malignant query | - |
dc.subject | Multi-dimensional analysis | - |
dc.subject | Personal information | - |
dc.subject | Data flow analysis | - |
dc.title | The detection model of malignant query and personal information leakage based on log analysis | - |
dc.type | Article | - |
dc.identifier.doi | 10.14257/ijmue.2015.10.11.10 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | International Journal of Multimedia and Ubiquitous Engineering, v.10, no.11, pp.105 - 114 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-84956853418 | - |
dc.citation.endPage | 114 | - |
dc.citation.number | 11 | - |
dc.citation.startPage | 105 | - |
dc.citation.title | International Journal of Multimedia and Ubiquitous Engineering | - |
dc.citation.volume | 10 | - |
dc.contributor.affiliatedAuthor | Kim, G.-Y. | - |
dc.contributor.affiliatedAuthor | Shin, Y. | - |
dc.contributor.affiliatedAuthor | Kim, J.-B. | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Database security | - |
dc.subject.keywordAuthor | Detection | - |
dc.subject.keywordAuthor | Log analysis | - |
dc.subject.keywordAuthor | Malignant query | - |
dc.subject.keywordAuthor | Personal information | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.