Inference attack

Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. [ [http://research.microsoft.com/~jckrumm/Publications%202007/inference%20attack%20refined02%20distribute.pdf "Inference Attacks on Location Tracks" by John Krumm] ] A subject's sensitive information can be considered as leaked if an adversary can infer its real value with a high confidence. [http://www.ics.uci.edu/~chenli/pub/2007-dasfaa.pdf "Protecting Individual Information AgainstInference Attacks in Data Publishing" by Chen Li, Houtan Shirani-Mehr, and Xiaochun Yang] This is an example of breached information security. An Inference attack occurs when a user is able to infer from trivial information more robust information about a database without directly accessing it. [ [http://andromeda.rutgers.edu/~gshafer/raman.pdf "Detecting Inference Attacks Using Association Rules" by Sangeetha Raman, 2001] ] The object of Inference attacks is to piece together information at one security level to determine a fact that should be protected at a higher security level. [ [http://databases.about.com/od/security/l/aainference.htm "Database Security Issues: Inference" by Mike Chapple] ]

Countermeasures

Computer security inference control is the attempt to prevent users to infer classified information from rightfully accessible chunks of information with lower classification. Computer security professionals install protocols into databases to prevent inference attacks by software but to date there is no software or hardware, such as an anti-inference engine, that delivers this countermeasure against a human inference engine. [ [http://www.unesco.org/webworld/public_domain/tunis97/com_54/com_54.html "Computer Security Inference Control" by Halim. M. Khelalfa (1997)] ]

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • The Design Inference —   Author(s) William Dembski …   Wikipedia

  • Psychology (The separation of) from philosophy — The separation of psychology from philosophy Studies in the sciences of mind 1815–1879 Edward S.Reed THE IMPOSSIBLE SCIENCE Traditional metaphysics The consensus of European opinion during and immediately after the Napoleonic era was that… …   History of philosophy

  • Supporting Banpresto original characters — This is a list of original characters created by Banpresto that serve in supporting roles to major protagonists or antagonists in the Super Robot Wars games. EarthlingsAdler KochAdler Koch is a fictional character in the Super Robot Wars series.… …   Wikipedia

  • Mill, John Stuart: Logic and metaphysics — J.S.Mill Logic and metaphysics John Skorupski ENLIGHTENMENT AND ROMANTICISM IN MILL’S PHILOSOPHY Mill’s importance as one of the major figures of nineteenth century politics and culture, and the current interest in him as a moral and political… …   History of philosophy

  • epistemology — epistemological /i pis teuh meuh loj i keuhl/, adj. epistemologically, adv. epistemologist, n. /i pis teuh mol euh jee/, n. a branch of philosophy that investigates the origin, nature, methods, and limits of human knowledge. [1855 60; < Gk… …   Universalium

  • Christianity — /kris chee an i tee/, n., pl. Christianities. 1. the Christian religion, including the Catholic, Protestant, and Eastern Orthodox churches. 2. Christian beliefs or practices; Christian quality or character: Christianity mixed with pagan elements; …   Universalium

  • metaphysics — /met euh fiz iks/, n. (used with a sing. v.) 1. the branch of philosophy that treats of first principles, includes ontology and cosmology, and is intimately connected with epistemology. 2. philosophy, esp. in its more abstruse branches. 3. the… …   Universalium

  • Propaganda — This article is about the form of communication. For other uses, see Propaganda (disambiguation). French Military Propaganda postcard showing a caricature of Kaiser Wilhelm II biting the world (c. 1915) …   Wikipedia

  • SQL injection — A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website in order to dump the database content to the attacker. SQL injection is a code injection technique that… …   Wikipedia

  • Stoicism — Stoicism1 Brad Inwood 1 FROM SOCRATES TO ZENO More than eighty years passed between the death of Socrates in 399 BC and the arrival in Athens of Zeno in 312. Athenian society had undergone enormous upheavals, both political and social. The Greek… …   History of philosophy

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”