Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Asmaa Sallam is active.

Publication


Featured researches published by Asmaa Sallam.


international conference on data engineering | 2012

M3: Stream Processing on Main-Memory MapReduce

Ahmed M. Aly; Asmaa Sallam; Bala M. Gnanasekaran; Long Van Nguyen-Dinh; Walid G. Aref; Mourad Ouzzani; Arif Ghafoor

The continuous growth of social web applications along with the development of sensor capabilities in electronic devices is creating countless opportunities to analyze the enormous amounts of data that is continuously steaming from these applications and devices. To process large scale data on large scale computing clusters, MapReduce has been introduced as a framework for parallel computing. However, most of the current implementations of the MapReduce framework support only the execution of fixed-input jobs. Such restriction makes these implementations inapplicable for most streaming applications, in which queries are continuous in nature, and input data streams are continuously received at high arrival rates. In this demonstration, we showcase M3, a prototype implementation of the MapReduce framework in which continuous queries over streams of data can be efficiently answered. M3 extends Hadoop, the open source implementation of MapReduce, bypassing the Hadoop Distributed File System (HDFS) to support main-memory-only processing. Moreover, M3 supports continuous execution of the Map and Reduce phases where individual Mappers and Reducers never terminate.


conference on data and application security and privacy | 2015

DetAnom: Detecting Anomalous Database Transactions by Insiders

Syed Rafiul Hussain; Asmaa Sallam; Elisa Bertino

Database Management Systems (DBMSs) provide access control mechanisms that allow database administrators (DBA) to grant application programs access privileges to databases. However, securing the database alone is not enough, as attackers aiming at stealing data can take advantage of vulnerabilities in the privileged applications and make applications to issue malicious database queries. Therefore, even though the access control mechanism can prevent application programs from accessing the data to which the programs are not authorized, it is unable to prevent misuse of the data to which application programs are authorized for access. Hence, we need a mechanism able to detect malicious behavior resulting from previously authorized applications. In this paper, we design and implement an anomaly detection mechanism, DetAnom, that creates a profile of the application program which can succinctly represent the applications normal behavior in terms of its interaction (i.e., submission of SQL queries) with the database. For each query, the profile keeps a signature and also the corresponding constraints that the application program must satisfy to submit that query. Later in the detection phase, whenever the application issues a query, the corresponding signature and constraints are checked against the current context of the application. If there is a mismatch, the query is marked as anomalous. The main advantage of our anomaly detection mechanism is that we need neither any previous knowledge of application vulnerabilities nor any example of possible attacks to build the application profiles. As a result, our DetAnom mechanism is able to protect the data from attacks tailored to database applications such as code modification attacks, SQL injections, and also from other data-centric attacks as well. We have implemented our mechanism with a software testing technique called concolic testing and the PostgreSQL DBMS. Experimental results show that our profiling technique is close to accurate, and requires acceptable amount of time, and that the detection mechanism incurs low run-time overhead.


IEEE Systems Journal | 2017

DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts

Asmaa Sallam; Elisa Bertino; Syed Rafiul Hussain; David Landers; R. Michael Lefler; Donald Steiner

Attempts by insiders to exfiltrate data have become a severe threat to the enterprise. Conventional data security techniques, such as access control and encryption, must be augmented with techniques to detect anomalies in data access that may indicate exfiltration attempts. In this paper, we present the design and evaluation of DBSAFE, a system to detect, alert on, and respond to anomalies in database access designed specifically for relational database management systems (DBMS). The system automatically builds and maintains profiles of normal user and application behavior, based on their interaction with the monitored database during a training phase. The system then uses these profiles to detect anomalous behavior that deviates from normality. Once an anomaly is detected, the system uses predetermined policies guiding automated and/or human response to the anomaly. The DBSAFE architecture does not impose any restrictions on the type of the monitored DBMS. Evaluation results indicate that the proposed techniques are indeed effective in detecting anomalies.


extending database technology | 2013

PostgreSQL anomalous query detector

Bilal Shebaro; Asmaa Sallam; Ashish Kamra; Elisa Bertino

We propose to demonstrate the design, implementation, and the capabilities of an anomaly detection (AD) system integrated with a relational database management system (DBMS). Our AD system is trained by extracting relevant features from the parse-tree representation of the SQL commands, and then uses the DBMS roles as the classes for the bayesian classifier. In the detection phase, the maximum apriori probability role is chosen by the classifier which, if not matching the role associated with the SQL command, raises an alarm. We have implemented such system in the PostgreSQL DBMS, integrated with the statistics collection and the query processing mechanism of the DBMS. During the demonstration, our audience will be given the choice of training our system using either synthetic role-based SQL query traces based on probability sampling, or by entering their own set of training queries. In the subsequent detection mode, the audience can test the detection capabilities of the system by submitting arbitrary SQL commands. We will also allow the audience to generate arbitrary work loads to measure the overhead of the training phase and the detection phase of our AD mechanism on the performance of the DBMS.


Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery | 2016

Data and syntax centric anomaly detection for relational databases

Asmaa Sallam; Daren Fadolalkarim; Elisa Bertino; Qian Xiao

Recent studies show that insider attacks that aim at exfiltrating data are very common and that these attacks are performed according to specific patterns. Protecting against such threats requires complementing existing security techniques, such as access control and encryption, with tools able to detect anomalies in data accesses. In this paper, we present a technique specifically tailored for detecting anomalous database accesses. Our technique extracts users’ access patterns based on both the syntax of the input queries and the amount of data in their output results. Our technique is based on mining SQL queries in database audit logs in order to form profiles of the normal users’ access patterns. New queries are checked upon these profiles, and deviations from these profiles are considered anomalous and thus indicative of possible attempts to exfiltrate or misuse the data. Our technique works under two application scenarios. The first is when the database has role‐based access control (RBAC) in place. Under an RBAC system, users belong to roles and privileges are associated with roles rather than individual users. For this scenario, we form profiles of roles which make our approach usable for database management systems (DBMSs) that have a large user population; in this scenario, we apply the naive Bayesian classifier which shows accurate results in practice. We also employ multilabeling classification to enhance accuracy when the access patterns are common to multiple roles. The second application scenario is when the DBMS does not apply RBAC. In this scenario, we apply the COBWEB clustering method. Experimental results indicate that our techniques are very effective. WIREs Data Mining Knowl Discov 2016, 6:231–239. doi: 10.1002/widm.1195


information reuse and integration | 2016

Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper)

Asmaa Sallam; Qian Xiao; Elisa Bertino; Daren Fadolalkarim

In this paper, we propose techniques for detecting anomalies in user accesses by learning profiles of normal access patterns of users based on both the syntactic and semantic features of past users queries stored in database logs. New accesses are checked upon these profiles and deviations are considered anomalous accesses which may be indications of potential insider attacks. We consider two scenarios. The first scenario is when the monitored database employs role-based access control (RBAC). In this scenario, we build profiles of roles rather than individual users, this makes our approach usable for databases which have a large user population. In this case, we use the naive Bayesian classification to detect anomalies. We also employ multilabeling classification to account for the case when roles have common access patterns. The second scenario is when RBAC is not used. In this case, we detect anomalies using the COBWEB clustering algorithm. We provide extensive evaluation for our techniques. Results show that our techniques are effective.


Journal of Network and Computer Applications | 2014

Detecting mobile malware threats to homeland security through static analysis

Seung-Hyun Seo; Aditi Gupta; Asmaa Sallam; Elisa Bertino; Kangbin Yim


computer and communications security | 2014

POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs

Asmaa Sallam; Elisa Bertino


conference on data and application security and privacy | 2016

PANDDE: Provenance-based ANomaly Detection of Data Exfiltration

Daren Fadolalkarim; Asmaa Sallam; Elisa Bertino


alexandria engineering journal | 2012

Distributed processing of continuous spatiotemporal queries over road networks

Asmaa Sallam; Khaled Nagi; Mohamed S. Abougabal; Walid G. Aref

Collaboration


Dive into the Asmaa Sallam's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge