39 lines
1.6 KiB
Plaintext
39 lines
1.6 KiB
Plaintext
---
|
||
title: Insider Threats
|
||
datasets:
|
||
- name: UB Exam Dataset
|
||
year: 2016
|
||
url: https://odin.cse.buffalo.edu/public_data/2016-UB-Exam-Queries.zip
|
||
---
|
||
|
||
|
||
<img src="<%=asset_path("logos")%>/EttuLogo.png" alt="Ettu" width="104" height="104" style="float: left; margin-top: 20px"/>
|
||
|
||
<h1>Insider Threat Detection</h1>
|
||
|
||
<p><b>Students:</b> <%= LabMetadata::members_on_project("insider-threats").map { |m| LabMetadata::link_for(m) }.join(", ") %></p>
|
||
|
||
<p>One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Often this is simply a matter of practicality; It is rarely feasible to establish an access control policy that is sufficiently permissive to be usable, while still being sufficiently restrictive to preclude malicious use. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity.</p>
|
||
|
||
<p><i>(Insider Threats is supported by NSF Grant #69110 and is in collaboration with Shambhu Upadhyaya, Varun Chandola, and Long Nguyen)</i></p>
|
||
|
||
<hr />
|
||
|
||
<h2>Publications</h2>
|
||
|
||
<ul class="paper_list">
|
||
<%= LabMetadata.render_pubs(
|
||
$db["publications"].
|
||
where { |pub| pub.fetch("projects", []).include? "insider-threats" }
|
||
) %>
|
||
</ul>
|
||
|
||
<hr />
|
||
|
||
<h1>Datasets</h1>
|
||
<ul>
|
||
<% datasets.each do |ds| %>
|
||
<li><div class="presentation"><a href="<%=ds["url"]%>"><%=ds["name"]%></a> (<%=ds["year"]%>)</div>
|
||
<% end %>
|
||
</ul>
|