A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

被引:39
作者
Alotaibi, Youseef [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca 21421, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 66卷 / 02期
关键词
Adaptive search memory; clustering; database management system (DBMS); intrusion detection system (IDS); quiplets; structured query language (SQL); tube search; ATTACKS;
D O I
10.32604/cmc.2020.013739
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users' profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS will stop query execution or report the threat to the responsible person if the query is malicious. A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier, where the Euclidean distance between the centers and the profile's issued query is calculated. A synthetic data set is used for our experimental evaluations. Normal user access behavior in relation to the database is modelled using the data set. The false negative (FN) and false positive (FP) rates are used to compare our proposed algorithm with other methods. The experimental results indicate that our proposed method results in very small FN and FP rates.
引用
收藏
页码:1879 / 1895
页数:17
相关论文
共 35 条
[1]  
Adeyanju R. I., 2020, MATHEMATICS, V8, P1
[2]   Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach [J].
AlEroud, Ahmed ;
Alsmadi, Izzat .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 80 :152-164
[3]   Empirical Detection Techniques of Insider Threat Incidents [J].
Alsowail, Rakan A. ;
Al-Shehari, Taher .
IEEE ACCESS, 2020, 8 :78385-78402
[4]   Personal Data Management Systems: The security and functionality standpoint [J].
Anciaux, Nicolas ;
Bonnet, Philippe ;
Bouganim, Luc ;
Nguyen, Benjamin ;
Pucheral, Philippe ;
Popa, Lulian Sandu ;
Scerri, Guillaume .
INFORMATION SYSTEMS, 2019, 80 :13-35
[5]  
[Anonymous], 2015, IEEE SYSTEMS J
[6]  
Ashish K., 2010, IEEE T KNOWL DATA EN, V23, P875
[7]   A novel honeypot based security approach for real-time intrusion detection and prevention systems [J].
Baykara, Muhammet ;
Das, Resul .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :103-116
[8]   Statistical fingerprint-based intrusion detection system (SF-IDS) [J].
Boero, Luca ;
Cello, Marco ;
Marchese, Mario ;
Mariconti, Enrico ;
Naqash, Talha ;
Zappatore, Sandro .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (10)
[9]   A semisupervised autoencoder-based approach for anomaly detection in high performance computing systems [J].
Borghesi, Andrea ;
Bartolini, Andrea ;
Lombardi, Michele ;
Milano, Michela ;
Benini, Luca .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2019, 85 :634-644
[10]   A convolutional neural-based learning classifier system for detecting database intrusion via insider attack [J].
Bu, Seok-Jun ;
Cho, Sung-Bae .
INFORMATION SCIENCES, 2020, 512 :123-136