Fuzzy ARM and cluster analysis for database intrusion detection and prevention

被引:0
作者
Singh I. [1 ]
Arora N. [1 ]
Arora S. [1 ]
Singhal P. [1 ]
机构
[1] Delhi Technological University, Delhi
关键词
Clustering; Computer security; Data mining; Data security; Database intrusion detection; Database security; FP growth; Fuzzy association rule mining; Fuzzy c-means; Privilege abuse; Transaction profiles;
D O I
10.1504/IJICS.2020.109483
中图分类号
学科分类号
摘要
Designing and implementation of an intrusion detection system in any database environment has emerged as an absolute necessity in the recent years. Detection of both, the outsider attack and privilege abuse from within the organisation, has become a fundamental need for maintenance of dynamic, scalable and reinforced databases. Proposed advanced approach, malicious query detection using fuzzy and cluster analysis (MQDFCA) operates in a seamless manner and efficaciously performs detection and prevention of transactions that are intrusive in nature, within a database environment, thus shielding the vital data stored in a database from any unauthorised/malicious access or modifications. The method utilises concepts of machine learning like fuzzy logic, association rule mining and clustering algorithms at various stages to validate a newly generated transaction at role segment, profile segment and the rule validation segment. The degree of adherence of user supplied queries within a transaction to the previously generated user roles, transaction profiles and extracted rules is used to categorise the transaction as non-malicious or malicious. The efficaciousness of proposed methodology in detection of intrusions is exemplified from the results of the experiments conducted on the synthetic dataset yielding recall and precision values of 93% and 98% respectively. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:372 / 395
页数:23
相关论文
共 50 条
  • [1] Analysis of database abnormity intrusion based outliers detection
    Yuan Zhong-yi
    Tang Wen-zhong
    Xu Xiao-lin
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1144 - 1147
  • [2] Detection of Database Intrusion Using a Two-Stage Fuzzy System
    Panigrahi, Suvasini
    Sural, Shamik
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 107 - 120
  • [3] Conditional Adherence based Classification of Transactions for Database Intrusion Detection and Prevention
    Singh, Indu
    Darbari, Vaibhav
    Kejriwal, Lakshya
    Agarwal, Aditya
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 42 - 49
  • [4] Role of Soft Outlier Analysis in Database Intrusion Detection
    Brahma, Anitarani
    Panigrahi, Suvasini
    ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 479 - 489
  • [5] An Effective Log Mining Approach for Database Intrusion Detection
    Hu, Yi
    Campan, Alina
    Walden, James
    Vorobyeva, Irina
    Shelton, Justin
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [6] A survey on database intrusion detection: approaches, challenges and application
    Jindal, Rajni
    Singh, Indu
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2019, 7 (06) : 559 - 592
  • [7] Database Intrusion Detection: Protecting Against the Insider Threat
    Barton, Kevin A.
    Jeffries-Horner, Carol J.
    AMCIS 2012 PROCEEDINGS, 2012,
  • [8] Database Intrusion Detection by Transaction Signature
    Rathod, Yagnik A.
    Chaudhari, M. B.
    Jethava, G. B.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [9] Anomaly intrusion detection based on dynamic cluster updating
    Oh, Sang-Hyun
    Lee, Won-Suk
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, 4426 : 737 - +
  • [10] Enhancing Detection Rate in Database Intrusion Detection System
    Rao, Udai Pratap
    Singh, Nikhil Kumar
    Amin, Akash R.
    Sahu, Kushal
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 556 - 563