Earticle

현재 위치 Home

The Detection Model of Malignant Query and Personal Information Leakage based on Log Analysis

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJMUE) 바로가기
  • 간행물
    International Journal of Multimedia and Ubiquitous Engineering SCOPUS 바로가기
  • 통권
    Vol.10 No.11 (2015.11)바로가기
  • 페이지
    pp.105-114
  • 저자
    Gei-Young Kim, Kyung-Jin Jung, Yongtae Shin, Sangphil Kim, Jong-Bae Kim
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A268229

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Many behaviors happen in information protection control, threatening from unauthorized change, destruction, and exposure to integrity, confidentiality, and availability of database, which is the final and core object of control. Like this it approaches database through numerous paths like many applications and home pages and execute query which search, modify, and delete the data. Some of it executes normal queries, but sometimes it maliciously executes the queries for leakage of information, and gives load to database server by executing the query which uses large amount of hardware resources. Traditionally it has limits, using only to find the reason for the problems, such as malignant queries, by collecting security log. Analyzing malignant queries and personal information leakage in diversified views through multidimensional analysis of data is necessary in order to use security log in more various ways. Therefore, this treatise is going to design multidimensional analysis modeling and suggest the technology to analyze in diversified views as an application plan of existing security log so that we can detect malignant queries and personal information leakage through security log analysis. We established the standard of analysis as follows for various analyses. First, we made linkage analysis available, which we cannot know with only simple history search, through analysis of database examination history. Second, we analyze if it repeatedly approached important table for a long time through detection of abnormal pattern or long term leakage via database abnormal access analysis. Third, we understood the flow of elements and data which weigh impact on specific database assets through database impact analysis and made analysis of database assets correlation and data flow analysis available. For analysis this treatise analyzed the log collected by using OLAP tools and used experiment data and operation data in order to verify the efficiency of database security log analysis technology suggested. Also we showed that the analysis method suggested by this treatise is excellent in availability and credibility in detection of malignant queries and personal information leakage, by comparing traditional data analysis method and the analysis method suggested by this treatise.

목차

Abstract
 1. Introduction
 2. Related Works
 3. Detection of Malignant Query and Personal Information Leakage through Database Security Log Analysis
  3.1. Types of SQL Injection Attack Queries
  3.2. Types of Personal Information Leaking Queries
  3.3. Designing and Composing Database Security Log Analysis
  3.4. Atypical Audit History Analysis Method
  3.5. Abnormal Pattern Detection Method
  3.6. Detection Method for Long-Term Information Leakage
 4. Conclusions
 References

키워드

Database Security Log Analysis Malignant Query Personal Information Detection

저자

  • Gei-Young Kim [ Dept. of IT Policy and Mgmt., Graduate School of Soongsil Univ., Seoul 156-743, Korea ]
  • Kyung-Jin Jung [ Dept. of IT Policy and Mgmt., Graduate School of Soongsil Univ., Seoul 156-743, Korea ]
  • Yongtae Shin [ Dept. of IT Policy and Mgmt., Graduate School of Soongsil Univ., Seoul 156-743, Korea ]
  • Sangphil Kim [ Graduate School of Software, Soongsil University, Sangdo-dong, Dongjak-gu, Seoul, Korea ]
  • Jong-Bae Kim [ Graduate School of Software, Soongsil University, Sangdo-dong, Dongjak-gu, Seoul, Korea ] Corresponding author

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Multimedia and Ubiquitous Engineering
  • 간기
    월간
  • pISSN
    1975-0080
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.11

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장