An Elicitation Technique for Handling Data Malicious Activity

Mitigating leakage or misuse incidents of data stored in databases (i.e., tabular data) by an insider having legitimate privileges to access the data is a challenging task. Assigning a misusability weight to a given dataset is strongly related to the way the data is presented (e.g., tabular data, structured or free text) and is domain specific. Applying anomaly detection by learning the normal behavior of an insider in terms of the sensitivity level of the data the user is usually exposed to Improving the process of handling leakage incidents identified by other misuse detection systems by enabling the security officer to focus on incidents involving more sensitive data.

Provided by: International Journal for Development of Computer Science & Technology (IJDCST) Topic: Big Data Date Added: Nov 2013 Format: PDF

Find By Topic