Hunting the Unknown - White-Box Database Leakage Detection
نویسندگان
چکیده
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain why a given query is anomalous, which further boosts the practical applicability of the system.
منابع مشابه
Overview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملLOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks
Recent advances in machine learning are paving the way for the artificial generation of high quality images and videos. In this paper, we investigate how generating synthetic samples through generative models can lead to information leakage, and, consequently, to privacy breaches affecting individuals’ privacy that contribute their personal or sensitive data to train these models. In order to q...
متن کاملWhite-Box Cryptography in the Gray Box
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...
متن کاملAdequacy of Bounded Exhaustive Testing and Incomplete Oracles for Elusive Bug Detection
Elusive bugs (EB) are not reliably discovered using standard methods such as black and white box testing. Bounded exhaustive testing (BET) is a promising approach for their detection. A generic EB fault model is introduced which is used to consider the adequacy of BET for EB detection. BET requires the use of an automatic oracle. Situations in which automation may only be practical with the use...
متن کاملEvaluation of the White Test for the Intraoperative Detection of Bile Leakage
We assess whether the White test is better than the conventional bile leakage test for the intraoperative detection of bile leakage in hepatectomized patients. This study included 30 patients who received elective liver resection. Both the conventional bile leakage test (injecting an isotonic sodium chloride solution through the cystic duct) and the White test (injecting a fat emulsion solution...
متن کامل