Fuzzy ARM and cluster analysis for database intrusion detection and prevention

被引:0
作者
Singh I. [1 ]
Arora N. [1 ]
Arora S. [1 ]
Singhal P. [1 ]
机构
[1] Delhi Technological University, Delhi
关键词
Clustering; Computer security; Data mining; Data security; Database intrusion detection; Database security; FP growth; Fuzzy association rule mining; Fuzzy c-means; Privilege abuse; Transaction profiles;
D O I
10.1504/IJICS.2020.109483
中图分类号
学科分类号
摘要
Designing and implementation of an intrusion detection system in any database environment has emerged as an absolute necessity in the recent years. Detection of both, the outsider attack and privilege abuse from within the organisation, has become a fundamental need for maintenance of dynamic, scalable and reinforced databases. Proposed advanced approach, malicious query detection using fuzzy and cluster analysis (MQDFCA) operates in a seamless manner and efficaciously performs detection and prevention of transactions that are intrusive in nature, within a database environment, thus shielding the vital data stored in a database from any unauthorised/malicious access or modifications. The method utilises concepts of machine learning like fuzzy logic, association rule mining and clustering algorithms at various stages to validate a newly generated transaction at role segment, profile segment and the rule validation segment. The degree of adherence of user supplied queries within a transaction to the previously generated user roles, transaction profiles and extracted rules is used to categorise the transaction as non-malicious or malicious. The efficaciousness of proposed methodology in detection of intrusions is exemplified from the results of the experiments conducted on the synthetic dataset yielding recall and precision values of 93% and 98% respectively. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:372 / 395
页数:23
相关论文
共 50 条
  • [21] A New Architecture for Network Intrusion Detection and Prevention
    Bul'Ajoul, Waleed
    James, Anne
    Shaikh, Siraj
    IEEE ACCESS, 2019, 7 : 18558 - 18573
  • [22] APPLICATION OF FUZZY CLUSTERING ALGORITHM IN INTRUSION DETECTION SYSTEM
    Li Yun
    Wu Jie-fang
    Liu Xue-cheng
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 297 - 300
  • [23] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462
  • [24] Intrusion Detection Based on Neuro-Fuzzy Classification
    Gaied, Imen
    Jemili, Farah
    Korbaa, Ouajdi
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [25] Multilayered Database Intrusion Detection System for Detecting Malicious Behaviors in Big Data Transaction
    Doroudian, Mostafa
    Arastouie, Narges
    Talebi, Mohammad
    Ghanbarian, Ali Reza
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 105 - 110
  • [26] Database Intrusion Detection System Using Octraplet and Machine Learning
    Jayaprakash, Souparnika
    Kandasamy, Kamalanathan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1413 - 1416
  • [27] Database Intrusion Detection Using Role Profiling with Role Hierarchy
    Wu, Garfield Zhiping
    Osborn, Sylvia L.
    Jin, Xin
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 33 - +
  • [28] Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection
    Subudhi, Sharmila
    Behera, Tanmay Kumar
    Panigrahi, Suvasini
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 78 - 82
  • [29] Classifying Database Users for Intrusion Prediction and Detection in Data Security
    Bakir, Cigdem
    Hakkoymaz, Veli
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2020, 27 (06): : 1857 - 1862
  • [30] Temporal Analysis Of Intrusion Detection
    Hogo, Mofreh A.
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,