Fuzzy ARM and cluster analysis for database intrusion detection and prevention

被引:0
作者
Singh I. [1 ]
Arora N. [1 ]
Arora S. [1 ]
Singhal P. [1 ]
机构
[1] Delhi Technological University, Delhi
关键词
Clustering; Computer security; Data mining; Data security; Database intrusion detection; Database security; FP growth; Fuzzy association rule mining; Fuzzy c-means; Privilege abuse; Transaction profiles;
D O I
10.1504/IJICS.2020.109483
中图分类号
学科分类号
摘要
Designing and implementation of an intrusion detection system in any database environment has emerged as an absolute necessity in the recent years. Detection of both, the outsider attack and privilege abuse from within the organisation, has become a fundamental need for maintenance of dynamic, scalable and reinforced databases. Proposed advanced approach, malicious query detection using fuzzy and cluster analysis (MQDFCA) operates in a seamless manner and efficaciously performs detection and prevention of transactions that are intrusive in nature, within a database environment, thus shielding the vital data stored in a database from any unauthorised/malicious access or modifications. The method utilises concepts of machine learning like fuzzy logic, association rule mining and clustering algorithms at various stages to validate a newly generated transaction at role segment, profile segment and the rule validation segment. The degree of adherence of user supplied queries within a transaction to the previously generated user roles, transaction profiles and extracted rules is used to categorise the transaction as non-malicious or malicious. The efficaciousness of proposed methodology in detection of intrusions is exemplified from the results of the experiments conducted on the synthetic dataset yielding recall and precision values of 93% and 98% respectively. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:372 / 395
页数:23
相关论文
共 50 条
  • [41] Intrusion Detection Framework of Cluster-based Wireless Sensor Network
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 857 - 861
  • [42] Intrusion Detection Framework of Cluster-based Wireless Sensor Network
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Feham, Mohammed
    2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2012, : 893 - 897
  • [43] cFEM: a cluster based feature extraction method for network intrusion detection
    Mazumder, Md. Mumtahin Habib Ullah
    Kadir, Md. Eusha
    Sharmin, Sadia
    Islam, Md. Shariful
    Alam, Muhammad Mahbub
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1355 - 1369
  • [44] cFEM: a cluster based feature extraction method for network intrusion detection
    Md. Mumtahin Habib Ullah Mazumder
    Md. Eusha Kadir
    Sadia Sharmin
    Md. Shariful Islam
    Muhammad Mahbub Alam
    International Journal of Information Security, 2023, 22 : 1355 - 1369
  • [45] An Intrusion Detection Model Based on Fuzzy C-means Algorithm
    Man, Liyu
    Xian, Youan
    2018 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2018, : 120 - 123
  • [46] Intrusion Detection Using Keystroke Dynamics & Fuzzy Logic Membership Functions
    Sridhar, Mahalaxmi
    Vaidya, Siddhesh
    Yawalkar, Piyush
    2015 INTERNATIONAL CONFERENCE ON TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (ICTSD-2015), 2015,
  • [47] Database intrusion detection using role and user behavior based risk assessment
    Singh, Indu
    Kumar, Narendra
    Srinivasa, K. G.
    Sharma, Tript
    Kumar, Vaibhav
    Singhal, Siddharth
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [48] A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics
    Alotaibi, Youseef
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (02): : 1879 - 1895
  • [49] A Hybrid Approach for Database Intrusion Detection at Transaction and Inter-transaction Levels
    Doroudian, Mostafa
    Shahriari, Hamid Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 155 - 167
  • [50] A Hybrid Approach for Database Intrusion Detection at Transaction and Inter-transaction Levels
    Doroudian, Mostafa
    Shahriari, Hamid Reza
    2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 1 - 6