Fuzzy ARM and cluster analysis for database intrusion detection and prevention

被引:0
作者
Singh I. [1 ]
Arora N. [1 ]
Arora S. [1 ]
Singhal P. [1 ]
机构
[1] Delhi Technological University, Delhi
关键词
Clustering; Computer security; Data mining; Data security; Database intrusion detection; Database security; FP growth; Fuzzy association rule mining; Fuzzy c-means; Privilege abuse; Transaction profiles;
D O I
10.1504/IJICS.2020.109483
中图分类号
学科分类号
摘要
Designing and implementation of an intrusion detection system in any database environment has emerged as an absolute necessity in the recent years. Detection of both, the outsider attack and privilege abuse from within the organisation, has become a fundamental need for maintenance of dynamic, scalable and reinforced databases. Proposed advanced approach, malicious query detection using fuzzy and cluster analysis (MQDFCA) operates in a seamless manner and efficaciously performs detection and prevention of transactions that are intrusive in nature, within a database environment, thus shielding the vital data stored in a database from any unauthorised/malicious access or modifications. The method utilises concepts of machine learning like fuzzy logic, association rule mining and clustering algorithms at various stages to validate a newly generated transaction at role segment, profile segment and the rule validation segment. The degree of adherence of user supplied queries within a transaction to the previously generated user roles, transaction profiles and extracted rules is used to categorise the transaction as non-malicious or malicious. The efficaciousness of proposed methodology in detection of intrusions is exemplified from the results of the experiments conducted on the synthetic dataset yielding recall and precision values of 93% and 98% respectively. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:372 / 395
页数:23
相关论文
共 50 条
  • [31] Classifying Database Users for Intrusion Prediction and Detection in Data Security
    Bakir, Cigdem
    Hakkoymaz, Veli
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2020, 27 (06): : 1857 - 1862
  • [32] Use of OPTICS and Supervised Learning Methods for Database Intrusion Detection
    Subudhi, Sharmila
    Behera, Tanmay Kumar
    Panigrahi, Suvasini
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 78 - 82
  • [33] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [34] Rule-based database intrusion detection using coactive artificial neuro-fuzzy inference system and genetic algorithm
    Brahma A.
    Panigrahi S.
    Samal N.
    Gountia D.
    International Journal of Business Intelligence and Data Mining, 2022, 21 (01) : 85 - 101
  • [35] Database Intrusion Detection System for Detecting Malicious Behaviors in Transaction and Inter-Transaction Levels
    Doroudian, Mostafa
    Shahriari, Hamid Reza
    2014 7th International Symposium on Telecommunications (IST), 2014, : 809 - 814
  • [36] Intelligent multi-agent based database hybrid intrusion prevention system
    Ramasubramanian, P
    Kannan, A
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, PROCEEDINGS, 2004, 3255 : 393 - 408
  • [37] Applications of fuzzy data mining methods for intrusion detection systems
    Guan, J
    Liu, DX
    Wang, T
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 3, 2004, 3045 : 706 - 714
  • [38] ProtoMon: Embedded monitors for cryptographic protocol intrusion detection and prevention
    Joglekar, SP
    Tate, SR
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (01) : 83 - 103
  • [39] An efficient intrusion detection and prevention framework for ad hoc networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghanemi, Salim
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 298 - 325
  • [40] Crime Analysis Mapping, Intrusion Detection - Using Data Mining
    Panja, Biswajit
    Meharia, Priyanka
    Mannem, Kreethi
    2020 IEEE TECHNOLOGY & ENGINEERING MANAGEMENT CONFERENCE (TEMSCON 2020), 2020,