2012
DOI: 10.1007/978-3-642-30428-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Process Mining and Security: Visualization in Database Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…A novel approach for visualizing database intrusion detection using process mining techniques modelling low-level event logs has been proposed [19]. The visualization will be able to help security officers who might not know deeply the complex system, identify the true positive detection and eliminate the false positive results [19].…”
Section: Research Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…A novel approach for visualizing database intrusion detection using process mining techniques modelling low-level event logs has been proposed [19]. The visualization will be able to help security officers who might not know deeply the complex system, identify the true positive detection and eliminate the false positive results [19].…”
Section: Research Resultsmentioning
confidence: 99%
“…A novel approach for visualizing database intrusion detection using process mining techniques modelling low-level event logs has been proposed [19]. The visualization will be able to help security officers who might not know deeply the complex system, identify the true positive detection and eliminate the false positive results [19]. One of our future research courses might be to investigate heuristics to embed them in this algorithm for the intrusion detection purpose [19].…”
Section: Research Resultsmentioning
confidence: 99%
“…Moreover, there is also the danger posed by insider threats. A legitimate user with malicious intent is a more serious threat than a user with limited privileges [13]. Threats from the outside can be alleviated by defensive programming techniques, but those from the inside can be mitigated by these.…”
Section: Introductionmentioning
confidence: 98%
“…Companies and organizations managing such data need to provide strong guarantees about the confidentiality of these data to comply with legal regulations and policies [2]. Although access control mechanisms are intact right from the deployment of an RDBMS, these alone are not enough to mitigate and defend from malicious attacks [13].…”
Section: Introductionmentioning
confidence: 99%
“…Illegal tampering or misuse of these data will not only cost companies and organizations huge monetary losses, but also incur customer damages and legal sanctions. While RDBMS provides efficient and systematic storage of data, its traditional security mechanisms, however, are not enough to protect from malicious threats [2]. An important component of a strong security framework able to protect sensitive data in these databases is an intrusion detection system (IDS).…”
Section: Introductionmentioning
confidence: 99%