Website/src/research/insider-threats/index.erb

39 lines
1.6 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters!

This file contains invisible Unicode characters that may be processed differently from what appears below. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to reveal hidden characters.

---
title: Insider Threats
datasets:
- name: UB Exam Dataset
year: 2016
url: https://odin.cse.buffalo.edu/public_data/2016-UB-Exam-Queries.zip
---
<img src="<%=asset_path("logos")%>/EttuLogo.png" alt="Ettu" width="104" height="104" style="float: left; margin-top: 20px"/>
<h1>Insider Threat Detection</h1>
<p><b>Students:</b> <%= LabMetadata::members_on_project("insider-threats").map { |m| LabMetadata::link_for(m) }.join(", ") %></p>
<p>One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Often this is simply a matter of practicality; It is rarely feasible to establish an access control policy that is sufficiently permissive to be usable, while still being sufficiently restrictive to preclude malicious use. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity.</p>
<p><i>(Insider Threats is supported by NSF Grant #69110 and is in collaboration with Shambhu Upadhyaya, Varun Chandola, and Long Nguyen)</i></p>
<hr />
<h2>Publications</h2>
<ul class="paper_list">
<%= LabMetadata.render_pubs(
$db["publications"].
where { |pub| pub.fetch("projects", []).include? "insider-threats" }
) %>
</ul>
<hr />
<h1>Datasets</h1>
<ul>
<% datasets.each do |ds| %>
<li><div class="presentation"><a href="<%=ds["url"]%>"><%=ds["name"]%></a> (<%=ds["year"]%>)</div>
<% end %>
</ul>