Machine Learning Based Detection of Anomalous User Behavior in University Data Centers

被引:0
作者
Kotenko, Igor [1 ]
Saenko, Igor [1 ]
Zelichenok, Igor [1 ]
机构
[1] Russian Acad Sci, St Petersburg Fed Res Ctr, SPC RAS, 39,14th Liniya, St Petersburg, Russia
来源
EUROPEAN JOURNAL ON ARTIFICIAL INTELLIGENCE | 2025年
关键词
Structured Query Language; cybersecurity; machine learning; classifiers; attacks;
D O I
10.1177/09217126251321146
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomalies in the work of data center users can be caused by both Structured Query Language (SQL) injection attacks and user attempts to make unauthorized access to data. The paper explores various machine learning models to detect such anomalies. The peculiarity of the problem being solved is its focus on the university data centers, whose databases have a non-normalized structure. In this case, the problem of reducing the feature space arises. The paper proposes an algorithm for generating a dataset based on typing the data table names. The experimental results obtained on supervised, unsupervised and semi-supervised machine learning models confirmed the high efficiency of the proposed approach. They showed that the support vector machine, random forest, Gaussian Naive Bayes, and neural network models are the most effective in detecting known SQL injections, and the local outlier factor semi-supervised learning model is the most effective in detecting unknown SQL injections and unauthorized access attempts.
引用
收藏
页数:13
相关论文
共 29 条
[1]   An Sql Injection Detection Model Using Chi-Square with Classification Techniques [J].
Adebiyi, Marion Olubunmi ;
Arowolo, Micheal Olaolu ;
Archibong, Goodnews Ime ;
Mshelia, Moses Damilola ;
Adebiyi, Ayodele Ariyo .
INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, :289-296
[2]  
Alqahtani J, 2020, INT WIREL COMMUN, P2106, DOI 10.1109/IWCMC48107.2020.9148470
[3]   Optimizing Low-Frequency Mode Stirring Performance Using Principal Component Analysis [J].
Arnaut, Luk R. .
IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2014, 56 (01) :3-14
[4]  
[Браницкий Александр Александрович Branitskiy Alexander Alexanderovich], 2016, [Труды СПИИРАН, Trudy SPIIRAN], P207, DOI 10.15622/SP.45.13
[5]  
Brownlee J., 2020, Data Preparation for Machine Learning: Data Cleaning, Feature Selection, and Data Transforms in Python
[6]   Machine Learning-based Anomaly Detection of Ganglia Monitoring Data in HEP Data Center [J].
Chen, Juan ;
Wang, Lu ;
Hu, Qingbao .
24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
[7]   Real-Time Anomaly Detection in Data Centers for Log-based Predictive Maintenance using an Evolving Fuzzy-Rule-Based Approach [J].
Decker, Leticia ;
Leite, Daniel ;
Giommi, Luca ;
Bonacorsi, Daniele .
2020 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2020,
[8]   Adversarial Impact on Anomaly Detection in Cloud Datacenters [J].
Deka, Pratyush Kr. ;
Bhuyan, Monowar H. ;
Kadobayashi, Youki ;
Elmroth, Erik .
2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, :188-197
[9]   Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems [J].
Gowtham, M. ;
Pramod, H. B. .
IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) :1057-1074
[10]   Detection of SQL Injection Attacks: A Machine Learning Approach [J].
Hasan, Musaab ;
Balbahaith, Zayed ;
Tarique, Mohammed .
2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2019,