loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Pierrette Annie Evina 1 ; Faouzi Jaidi 1 ; 2 ; Faten Labbene Ayachi 1 and Adel Bouhoula 3

Affiliations: 1 University of Carthage, Higher School of Communication of Tunis (Sup'Com), LR18TIC01 Digital Security Research Lab, Tunis, Tunisia ; 2 University of Carthage, National School of Engineers of Carthage, Tunis, Tunisia ; 3 Arabian Gulf University Department of Next-Generation Computing, College of Graduate Studies, Kingdom of Bahrain

Keyword(s): Anomaly Detection, Vulnerability Mask, Access Control, Databases Security.

Abstract: In Information Systems (IS) and specifically in databases, both internal and external attacks require a lot of attention. Due to inadequate manipulations in these systems, the access control policy (ACP) which is designed to control and protect resources from non-authorized users, may be subject to diverse alterations in its expression with significant anomalies. In the present paper, we study and establish basic scenarios that are encountered in such circumstances. We discuss other advanced scenarios based on correlation cases between basic ones. We mainly consider three basic concepts: Hidden User, Corrupted User and ACP vulnerability. Our contribution consists in the definition of a vulnerability mask, which makes it possible to calculate all the critical objects and to classify malicious users. This allows fine and reliable configuration of the risk management systems and the audit system as well as an objective and optimized analysis of log files and audit data. We present the a rchitecture of our approach for the detection of anomalies in a correlated risk management context. Our contribution specifically considers groups of anomalies for which occurrences are linked both temporally and spatially. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.236.101.52

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Evina, P.; Jaidi, F.; Ayachi, F. and Bouhoula, A. (2021). Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application. In Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE; ISBN 978-989-758-508-1; ISSN 2184-4895, SciTePress, pages 348-355. DOI: 10.5220/0010475303480355

@conference{enase21,
author={Pierrette Annie Evina. and Faouzi Jaidi. and Faten Labbene Ayachi. and Adel Bouhoula.},
title={Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application},
booktitle={Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE},
year={2021},
pages={348-355},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010475303480355},
isbn={978-989-758-508-1},
issn={2184-4895},
}

TY - CONF

JO - Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE
TI - Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application
SN - 978-989-758-508-1
IS - 2184-4895
AU - Evina, P.
AU - Jaidi, F.
AU - Ayachi, F.
AU - Bouhoula, A.
PY - 2021
SP - 348
EP - 355
DO - 10.5220/0010475303480355
PB - SciTePress