August 10, 2017 By Ofer Biller 3 min read

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can surprise and circumvent defenses by dynamically changing their tactics.

Database Access in Three Dimensions

Among other projects, my team at the IBM Cybersecurity Center of Excellence is working on the new IBM Security Guardium data visualization feature known as Data Insight, which allows security teams to see database attacks that don’t fit into standard patterns. Data Insight visualization is a unique tool that deploys cognitive technology to produce a dynamic 3-D video display of database access logs.

Data Insight allows security officers to watch thousands of database accesses in seconds, without categorizing or assigning those activities to preconceived assumptions of how an attack is supposed to take place. The tool provides users with hints and insights concerning database accesses in a given environment or period of time, making it very easy and intuitive to spot unexpected access sequences and discover breaches that don’t fit into conventional patterns. Ordinarily, you’d need to review multiple reports to get the same impression. There’s no other tool on the market that displays log accesses in video form in this way.

A New Perspective on Security Breaches

Database accesses provide an interesting perspective on security breaches. Both internal and external attacks often involve databases. But when it comes to insider threats, companies face the very serious problem of being blindsided by their own employees.

Insider threats due to either malicious or negligent employees are quickly becoming a major security challenge. Of the 874 incidents observed for the Ponemon Institute’s “2016 Cost of Data Breach Study,” 568 were caused by employee or contractor negligence, 191 by malicious employees and criminals, and 85 by outsiders using stolen credentials.

In both internal and external database attacks, analysts often look for certain patterns using techniques such as anomaly detection. The problem is that we don’t always know exactly what we’re looking for. Attacks can be very dynamic, and anomaly detection methods always use some inherent assumptions regarding the attacks they aim to find, since they search for general deviations from regular behavior.

Trading False Positives for New Insights

Visualizations can play a key role in data security. Security officers get dozens of reports of data anomalies every day, but many are false positives. It takes time and effort to determine that, however, and it’s often not obvious. That’s where our 3-D visualization solution comes in.

Before developing Data Insight, we showed a security officer a list of anomalies and asked him to identify the real attacks. Although we also gave him a pointer to information in the data, it was not a trivial task for him. We realized that a dynamic 3-D data visualization tool could provide a clear, distinguishable and fast depiction of what’s happening in an organization’s databases.

With Data Insight, we decided to create a different approach and leverage users’ visual capabilities to find things in the data. Rethinking security, we tried to answer this basic question: How can we pour out data in a way that will give security officers a better picture of what’s happening with their databases?

We realized that the best idea was to somehow present things from a different perspective, without any preconceived notions. We believe Data Insight does just that. As a result, it can be a very valuable tool for enterprise security teams.

Data Insight is the result of collaboration between IBM Security, the IBM Research Cybersecurity Center of Excellence and researchers from Ben-Gurion University in Beer Sheva, Israel.

Learn More About the latest Innovations from the IBM Cybersecurity Center of Excellence

More from Data Protection

Third-party access: The overlooked risk to your data protection plan

2 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors.The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In this…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today