DEMIDS: A Misuse Detection System for Database Systems

@inproceedings{Chung1999DEMIDSAM,
  title={DEMIDS: A Misuse Detection System for Database Systems},
  author={Christina Yip Chung and Michael Gertz and Karl N. Levitt},
  booktitle={IICIS},
  year={1999}
}
Despite the necessity of protecting information stored in database systems (DBS), existing security models are insufficient to prevent misuse, especially insider abuse by legitimate users. Further, concepts for misuse detection in DBS have not been adequately addressed by existing research in misuse detection. Even though there are available means to guard the information stored in a database system against misuse, they are seldom used by security officers because security policies of the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 147 CITATIONS

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

  • 2014 6th Conference on Information and Knowledge Technology (IKT)
  • 2014
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Enhancing Data Security in Data Warehousing

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Bayesian Network Approach to Detecting Privacy Intrusion

  • 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops
  • 2006
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Computer Intrusion Detection and Network Monitoring

  • Statistics for Engineering and Information Science
  • 2001
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Approaches and Challenges in Database Intrusion Detection

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2000
2019

CITATION STATISTICS

  • 17 Highly Influenced Citations

  • Averaged 4 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

29(2):38{47

Ravi Sandhu, Edward Coyne, Hal Feinstein, Charles Youman. Role-based access control models. IEEE Computer
  • February
  • 1996
VIEW 1 EXCERPT

Computer crime: an emerging challenge for law enforcement

Carter, Katz
  • FBI Law Enforcement Bulletin,
  • 1996

In Proceedinges of the IEEE Symposium on Research in Security and Privacy [OAK

Stephanie Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longsta . A sense of self for unix processes
  • 120{128,
  • 1996

Database Security

  • IFIP Advances in Information and Communication Technology
  • 1994
VIEW 1 EXCERPT

The SRI IDES statistical anomaly detector

  • Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1991

A network security monitor

  • Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
  • 1990