Hunting the Unknown - White-Box Database Leakage Detection

نویسندگان

  • Elisa Costante
  • Jerry den Hartog
  • Milan Petkovic
  • Sandro Etalle
  • Mykola Pechenizkiy
چکیده

Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain why a given query is anomalous, which further boosts the practical applicability of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks

Recent advances in machine learning are paving the way for the artificial generation of high quality images and videos. In this paper, we investigate how generating synthetic samples through generative models can lead to information leakage, and, consequently, to privacy breaches affecting individuals’ privacy that contribute their personal or sensitive data to train these models. In order to q...

متن کامل

White-Box Cryptography in the Gray Box

Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...

متن کامل

Adequacy of Bounded Exhaustive Testing and Incomplete Oracles for Elusive Bug Detection

Elusive bugs (EB) are not reliably discovered using standard methods such as black and white box testing. Bounded exhaustive testing (BET) is a promising approach for their detection. A generic EB fault model is introduced which is used to consider the adequacy of BET for EB detection. BET requires the use of an automatic oracle. Situations in which automation may only be practical with the use...

متن کامل

Evaluation of the White Test for the Intraoperative Detection of Bile Leakage

We assess whether the White test is better than the conventional bile leakage test for the intraoperative detection of bile leakage in hepatectomized patients. This study included 30 patients who received elective liver resection. Both the conventional bile leakage test (injecting an isotonic sodium chloride solution through the cystic duct) and the White test (injecting a fat emulsion solution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014