TY - JOUR
T1 - Database audit workload prioritization via game theory
AU - Yan, Chao
AU - Li, Bo
AU - Vorobeychik, Yevgeniy
AU - Laszka, Aron
AU - Fabbri, Daniel
AU - Malin, Bradley
N1 - Funding Information:
This work was supported in part by Grant No. R01LM10207 from the National Institutes of Health, Grants No. CNS-1526014, No. CNS-1640624, No. IIS-1649972, and No. IIS-1526860 from the National Science Foundation, Grant No. N00014-15-1-2621 from the Office of Naval Research, and Grant No. W911NF-16-1-0069 from the Army Research Office.
Funding Information:
This work was supported in part by Grant No. R01LM10207 from the National Institutes of Health, Grants No. CNS-1526014, No. CNS-1640624, No. IIS-1649972, and No. IIS-1526860 from the National Science Foundation, Grant No. N00014-15-1-2621 from the Office of Naval Research, and Grant No. W911NF-16-1-0069 from the Army Research Office. Authors’ addresses: C. Yan, Vanderbilt University, 2525 West End Ave, Nashville, TN, 37246; email: chao.yan@vanderbilt. edu; B. Li, University of Illinois at Urbana–Champaign, Siebel Center 201 N, Goodwin Ave, Urbana, IL 61801; email: [email protected]; Y. Vorobeychik, Washington University in St. Louis, Harold D. Jolley Hall, 1 Brookings Dr, St Louis, MO 63140; email: [email protected]; A. Laszka, University of Houston, Philip Guthrie Hoffman Hall, 3551 Cullen Blvd., Houston, TX 77204; email: [email protected]; D. Fabbri and B. Malin, Vanderbilt University, 2525 West End Ave, Nashville, TN 37246; emails: {daniel.fabbri, b.malin}@vanderbilt.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2019 Association for Computing Machinery. 2471-2566/2019/06-ART17 $15.00 https://doi.org/10.1145/3323924
Publisher Copyright:
© 2019 Association for Computing Machinery.
PY - 2019/6/10
Y1 - 2019/6/10
N2 - The quantity of personal data that is collected, stored, and subsequently processed continues to grow rapidly. Given its sensitivity, ensuring privacy protections has become a necessary component of database management. To enhance protection, a number of mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities. However, this approach is limited. First, the volume of alerts is often substantially greater than the auditing capabilities of organizations. Second, strategic attackers can attempt to disguise their actions or carefully choose targets, thus hide illicit activities. In this article, we introduce an auditing approach that accounts for adversarial behavior by (1) prioritizing the order in which types of alerts are investigated and (2) providing an upper bound on how much resource to allocate for each type. Specifically, we model the interaction between a database auditor and attackers as a Stackelberg game. We show that even a highly constrained version of such problem is NP-Hard. Then, we introduce a method that combines linear programming, column generation, and heuristic searching to derive an auditing policy. On the synthetic data, we perform an extensive evaluation on the approximation degree of our solution with the optimal one. The two real datasets, (1) 1.5 months of audit logs from Vanderbilt University Medical Center and (2) a publicly available credit card application dataset, are used to test the policy-searching performance. The findings demonstrate the effectiveness of the proposed methods for searching the audit strategies, and our general approach significantly outperforms non-game-theoretic baselines.
AB - The quantity of personal data that is collected, stored, and subsequently processed continues to grow rapidly. Given its sensitivity, ensuring privacy protections has become a necessary component of database management. To enhance protection, a number of mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities. However, this approach is limited. First, the volume of alerts is often substantially greater than the auditing capabilities of organizations. Second, strategic attackers can attempt to disguise their actions or carefully choose targets, thus hide illicit activities. In this article, we introduce an auditing approach that accounts for adversarial behavior by (1) prioritizing the order in which types of alerts are investigated and (2) providing an upper bound on how much resource to allocate for each type. Specifically, we model the interaction between a database auditor and attackers as a Stackelberg game. We show that even a highly constrained version of such problem is NP-Hard. Then, we introduce a method that combines linear programming, column generation, and heuristic searching to derive an auditing policy. On the synthetic data, we perform an extensive evaluation on the approximation degree of our solution with the optimal one. The two real datasets, (1) 1.5 months of audit logs from Vanderbilt University Medical Center and (2) a publicly available credit card application dataset, are used to test the policy-searching performance. The findings demonstrate the effectiveness of the proposed methods for searching the audit strategies, and our general approach significantly outperforms non-game-theoretic baselines.
UR - http://www.scopus.com/inward/record.url?scp=85069779135&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85069779135&partnerID=8YFLogxK
U2 - 10.1145/3323924
DO - 10.1145/3323924
M3 - Article
AN - SCOPUS:85069779135
SN - 2471-2566
VL - 22
JO - ACM Transactions on Privacy and Security
JF - ACM Transactions on Privacy and Security
IS - 3
M1 - 17
ER -