SlideShare a Scribd company logo
1 of 26
M-Score:
A Misuseability Weight Measure
Introduction
• Database : Asset of an organization
• CSW survey:26% of attacks caused by insiders.[1]
• Out of total attacks 16% because of theft of sensitive
data.
• 15% because of exposure of confidential data.

• Organization worried about misuse of data
Cont’d..
• Insiders
1)Employees
2)Business Partners
3)Service Providers
• Insider use Information/Data to perform their task

• Possibility of Misuse of Data
Motivation
• Insider may misuse crucial information of a Firm.
• Limiting access to data is not the solution.
• Need to mitigate misuse of Information from Insider.
Related Work
• Two approaches to detect misuse of Data.
1)Syntax Centric
2)Data Centric

• Syntax Centric : Data requests are analyze to detect
misuse.
•

Data Centric : Actual Data accessed is analyze to
detect misuse.
Related Work cont’d:
• “Detecting Anomalous Access Patterns in Relational
Data- bases”[2]
 Syntax Centric approach
 Capture all SQL statements submitted by user.
 Extract Features from captured SQL stmts.
 Use Extracted features to detect Anomaly.
Related Work cont’d..
• “A Risk Management Approach to RBAC,” Risk and
Decision Analysis[3]
 Syntax centric approach
 Designed Model for risk management Distributed DB
systems
 Measures Risk poses by user to misuse data
Related Work cont’d..
• “Data-Centric Approach to Insider Attack Detection
in Database Systems”[4]


Data Centric Approach



S-vector is created for every access to DB.



S-vector : Extracted statistical information from result set.



Analyze S-vector to detect inside misuse.
Related work cont’d..
• “Insider Threat Prediction Evaluating the Probability
of IT Misuse”[5]
 Preventive approach
 Insider Prediction tool
 Evaluated Potential Threat (EPT) measure to predict inside
threat.
Related Work Evaluation
• Some related work in this area analyze requests by
user submitted to DB to detect misuse.
• Another way to do that is analyze result set access by
user
• Some calculate Risk of misuse from particular user in
the organization.
Proposal
(A)To measure(M-score ) how much damage is
possible

if requested data is given to user and it is

misused ,in particular context .
(B)Utilize M-Score to mitigate misuse of data from
insiders.

• Our proposed work is limited to Relational DB.
Proposal cont’d : M-score
• Assign M-score :
1) Presentation Dependent(Tabular , structured , text)
2)Domain Specific
• Dimensions For Misuseability
1)No of Entities
2) Anonymity level
3) Number of properties
4) Values of properties
Proposal cont’d..
M-score based Dynamic Access control System
• Purpose : To regulate insider access control to
sensitive data.
• Data Centric approach.

• Each insider given Threshold M-score
• M-score of Result set calculated.
• Access is granted if user’s threshold is greater or
equal than Result-set score.
MDAC system cont’d..
MDAC works in two modes
1)Binary Mode
2)Subset disclosure Mode
Binary Mode : Complete access to data or No access.
Subset Disclosure Mode: Complete access or Subset of

actual result set
Requirement Analysis
Hardware/Software

Requirement

Processor

Pentium IV and above

RAM

1 GB

TOOLS

Netbeans IDE, Jdk 1.6

Technologies

JAVA

Operating System

Windows xp,7

Hard disk

8 GB

Database

MySQL
System Design
• General Architecture
DATABASE

Qi
Qi

Ri

User
Interface

Insider( I )

Result set for
Query

URi
URi
Qi-Query Submitted by user
Ri –Result Set For Qi
Uri-Updated Result set for Qi

MDAC
Decision
Block

Fig 1:Genral Architecture of MDAC

Calculate
M-score of
Ri
System Design

User login to the
system

• Flowchart

User submits query
to DB
Result Set(RS) for query
evaluated

Calculate M-score of RS

YES

M-score >
Threshold of
user M-score

NO

Mode?
Binary

Subset Disclosure
Remove most Sensitive Data

“Access
denied”

Display Result
set to user

Display subset of RS
User logout

Fig 2:Flowchart
Algorithm : M-score evaluation
Input :RS (Result Set for Query q) Table.
1)Calculate Raw Record Score(RRS) for each record in
the RS Table

2)Calculate Record Distinguishing Factor(RFD)
3)Calculate Final Record Score(FSD)
4)Calculate M-score of the Table
Output : M-score of the table
MDAC algorithm
• Input :M-score of RS Table And Threshold M-score Value of the User
1.
If (M-score of Rs table >= Threshold)
2.
then
3.
{
4.
if (Mode : Binary)
5.
then
6.
{
7.
Display Message ”Access denied”
8.
}
9.
else
10.
{
11.
Remove Most Sensitive Data Till
12.
M-score of RS Table<=Threshold
13.
Show Subset Of RS(i.e. Appropriate RS)
14.
}
15.
}
16.
Else
17.
{
18.
Show Result Set To the user
19.
}
Data Flow Diagram Level 0

Figure 3: DFD Level 0
Data Flow Diagram : Level 1

Fig 4
Use Case Diagram
Expected Results
• When M-score evaluated of result set before
exposing it to the user ,we can estimate the extent of
damage to firm if data is misused.
• We can take appropriate steps to mitigate inside
misuse
Conclusion
We proposed new concept, in which we
focused on degree of damage to the firm if
particular information in particular context by
particular insider is misused can be used to
mitigate the misuse of information.
Future Work
• Score Function in proposed system is strongly
domain dependent.
• Upgrade that score function to mitigate domain
dependency.
• Develop more applications of M-score to mitigate
data misuse.
References
[1] 2010 Cyber Security Watch Survey, http://www.cert.org/
archive/pdf/ecrimesummary10.pdf, 2012.
[2]A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous
Access Patterns in Relational Data- bases,” Int’l J. Very Large
Databases,vol. 17, no. 5, pp. 1063-1077, 2008.
[3]E. Celikel et al., “A Risk Management Approach to RBAC,”
Risk and Decision Analysis, vol. 1, no. 2, pp. 21-33, 2009.
[4]S. Mathew, M. Petropoulos, H.Q. Ngo, and S. Upadhyaya,
“Data-Centric Approach to Insider Attack Detection in
Database Systems,” Proc. 13th Conf. Recent Advances in
Intrusion Detection,2010.
[5]G.B. Magklaras and S.M. Furnell, “Insider Threat Prediction
Tool : Evaluating the Probability of IT Misuse,” Computers
and Security , vol. 21, no. 1, pp. 62-73, 2002.

More Related Content

Similar to M-Score

IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdfSPAMVEDANT
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionCamella Taylor
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET Journal
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And AnalysisLalit Kale
 
Towards Designing Effective Visualizations for DNS-based Network Threat Analysis
Towards Designing Effective Visualizations for DNS-based Network Threat AnalysisTowards Designing Effective Visualizations for DNS-based Network Threat Analysis
Towards Designing Effective Visualizations for DNS-based Network Threat AnalysisRosa Romero Gómez, PhD
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for CybersecurityVMware Tanzu
 
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...LINE Corp.
 
Data Analytics Using R - Report
Data Analytics Using R - ReportData Analytics Using R - Report
Data Analytics Using R - ReportAkanksha Gohil
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Tom Eston
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityIRJET Journal
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS IRJET Journal
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisIRJET Journal
 
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...IRJET Journal
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...yashbheda
 

Similar to M-Score (20)

IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft Detection
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
Towards Designing Effective Visualizations for DNS-based Network Threat Analysis
Towards Designing Effective Visualizations for DNS-based Network Threat AnalysisTowards Designing Effective Visualizations for DNS-based Network Threat Analysis
Towards Designing Effective Visualizations for DNS-based Network Threat Analysis
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
18.02.05_IAAI2018_Mobille Network Failure Event Detection and Forecasting wit...
 
Data Analytics Using R - Report
Data Analytics Using R - ReportData Analytics Using R - Report
Data Analytics Using R - Report
 
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Tourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine SimilarityTourist Destination Recommendation System using Cosine Similarity
Tourist Destination Recommendation System using Cosine Similarity
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data Analysis
 
Data mining on Financial Data
Data mining on Financial DataData mining on Financial Data
Data mining on Financial Data
 
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
50120130406017
5012013040601750120130406017
50120130406017
 
Module-4_Part-II.pptx
Module-4_Part-II.pptxModule-4_Part-II.pptx
Module-4_Part-II.pptx
 
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...
Big data (4Vs,history,concept,algorithm) analysis and applications #bigdata #...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

M-Score

  • 2. Introduction • Database : Asset of an organization • CSW survey:26% of attacks caused by insiders.[1] • Out of total attacks 16% because of theft of sensitive data. • 15% because of exposure of confidential data. • Organization worried about misuse of data
  • 3. Cont’d.. • Insiders 1)Employees 2)Business Partners 3)Service Providers • Insider use Information/Data to perform their task • Possibility of Misuse of Data
  • 4. Motivation • Insider may misuse crucial information of a Firm. • Limiting access to data is not the solution. • Need to mitigate misuse of Information from Insider.
  • 5. Related Work • Two approaches to detect misuse of Data. 1)Syntax Centric 2)Data Centric • Syntax Centric : Data requests are analyze to detect misuse. • Data Centric : Actual Data accessed is analyze to detect misuse.
  • 6. Related Work cont’d: • “Detecting Anomalous Access Patterns in Relational Data- bases”[2]  Syntax Centric approach  Capture all SQL statements submitted by user.  Extract Features from captured SQL stmts.  Use Extracted features to detect Anomaly.
  • 7. Related Work cont’d.. • “A Risk Management Approach to RBAC,” Risk and Decision Analysis[3]  Syntax centric approach  Designed Model for risk management Distributed DB systems  Measures Risk poses by user to misuse data
  • 8. Related Work cont’d.. • “Data-Centric Approach to Insider Attack Detection in Database Systems”[4]  Data Centric Approach  S-vector is created for every access to DB.  S-vector : Extracted statistical information from result set.  Analyze S-vector to detect inside misuse.
  • 9. Related work cont’d.. • “Insider Threat Prediction Evaluating the Probability of IT Misuse”[5]  Preventive approach  Insider Prediction tool  Evaluated Potential Threat (EPT) measure to predict inside threat.
  • 10. Related Work Evaluation • Some related work in this area analyze requests by user submitted to DB to detect misuse. • Another way to do that is analyze result set access by user • Some calculate Risk of misuse from particular user in the organization.
  • 11. Proposal (A)To measure(M-score ) how much damage is possible if requested data is given to user and it is misused ,in particular context . (B)Utilize M-Score to mitigate misuse of data from insiders. • Our proposed work is limited to Relational DB.
  • 12. Proposal cont’d : M-score • Assign M-score : 1) Presentation Dependent(Tabular , structured , text) 2)Domain Specific • Dimensions For Misuseability 1)No of Entities 2) Anonymity level 3) Number of properties 4) Values of properties
  • 13. Proposal cont’d.. M-score based Dynamic Access control System • Purpose : To regulate insider access control to sensitive data. • Data Centric approach. • Each insider given Threshold M-score • M-score of Result set calculated. • Access is granted if user’s threshold is greater or equal than Result-set score.
  • 14. MDAC system cont’d.. MDAC works in two modes 1)Binary Mode 2)Subset disclosure Mode Binary Mode : Complete access to data or No access. Subset Disclosure Mode: Complete access or Subset of actual result set
  • 15. Requirement Analysis Hardware/Software Requirement Processor Pentium IV and above RAM 1 GB TOOLS Netbeans IDE, Jdk 1.6 Technologies JAVA Operating System Windows xp,7 Hard disk 8 GB Database MySQL
  • 16. System Design • General Architecture DATABASE Qi Qi Ri User Interface Insider( I ) Result set for Query URi URi Qi-Query Submitted by user Ri –Result Set For Qi Uri-Updated Result set for Qi MDAC Decision Block Fig 1:Genral Architecture of MDAC Calculate M-score of Ri
  • 17. System Design User login to the system • Flowchart User submits query to DB Result Set(RS) for query evaluated Calculate M-score of RS YES M-score > Threshold of user M-score NO Mode? Binary Subset Disclosure Remove most Sensitive Data “Access denied” Display Result set to user Display subset of RS User logout Fig 2:Flowchart
  • 18. Algorithm : M-score evaluation Input :RS (Result Set for Query q) Table. 1)Calculate Raw Record Score(RRS) for each record in the RS Table 2)Calculate Record Distinguishing Factor(RFD) 3)Calculate Final Record Score(FSD) 4)Calculate M-score of the Table Output : M-score of the table
  • 19. MDAC algorithm • Input :M-score of RS Table And Threshold M-score Value of the User 1. If (M-score of Rs table >= Threshold) 2. then 3. { 4. if (Mode : Binary) 5. then 6. { 7. Display Message ”Access denied” 8. } 9. else 10. { 11. Remove Most Sensitive Data Till 12. M-score of RS Table<=Threshold 13. Show Subset Of RS(i.e. Appropriate RS) 14. } 15. } 16. Else 17. { 18. Show Result Set To the user 19. }
  • 20. Data Flow Diagram Level 0 Figure 3: DFD Level 0
  • 21. Data Flow Diagram : Level 1 Fig 4
  • 23. Expected Results • When M-score evaluated of result set before exposing it to the user ,we can estimate the extent of damage to firm if data is misused. • We can take appropriate steps to mitigate inside misuse
  • 24. Conclusion We proposed new concept, in which we focused on degree of damage to the firm if particular information in particular context by particular insider is misused can be used to mitigate the misuse of information.
  • 25. Future Work • Score Function in proposed system is strongly domain dependent. • Upgrade that score function to mitigate domain dependency. • Develop more applications of M-score to mitigate data misuse.
  • 26. References [1] 2010 Cyber Security Watch Survey, http://www.cert.org/ archive/pdf/ecrimesummary10.pdf, 2012. [2]A. Kamra, E. Terzi, and E. Bertino, “Detecting Anomalous Access Patterns in Relational Data- bases,” Int’l J. Very Large Databases,vol. 17, no. 5, pp. 1063-1077, 2008. [3]E. Celikel et al., “A Risk Management Approach to RBAC,” Risk and Decision Analysis, vol. 1, no. 2, pp. 21-33, 2009. [4]S. Mathew, M. Petropoulos, H.Q. Ngo, and S. Upadhyaya, “Data-Centric Approach to Insider Attack Detection in Database Systems,” Proc. 13th Conf. Recent Advances in Intrusion Detection,2010. [5]G.B. Magklaras and S.M. Furnell, “Insider Threat Prediction Tool : Evaluating the Probability of IT Misuse,” Computers and Security , vol. 21, no. 1, pp. 62-73, 2002.