Application of OPTICS and ensemble learning for Database Intrusion Detection

被引:13
作者
Subudhi, Sharmila [1 ]
Panigrahi, Suvasini [2 ]
机构
[1] SOA Deemed Univ, Inst Tech Educ & Res, Dept CS&IT, Bhubaneswar 751030, Odisha, India
[2] Veer Surendra Sai Univ Technol, Dept CSE, Burla 768018, Orissa, India
关键词
Intrusion detection; Database; OPTICS; Outlier factor; Ensemble classifier;
D O I
10.1016/j.jksuci.2019.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have proposed a novel approach for detecting intrusive activities in databases by the use of clustering and information fusion through ensemble learning. We have applied OPTICS cluster-ing on the transaction attributes for building user behavioral profiles. A transaction is initially passed through the clustering module for computing its cluster belongingness and an outlier factor that sig-nifies its degree of outlierness. Depending on the outlier factor value, the transaction is classified as genuine or an outlier. Each outlier transaction is further analyzed by passing it onto an Ensemble Learner that applies three different aggregation methods, bagging, boosting and stacking. We have conducted experiments using stochastic models to demonstrate the effectiveness of the proposed sys-tem. The performance of the three different ensembles are evaluated and compared based on various metrics. Moreover, our system is found to exhibit better performance as compared to other approaches taken from the literature.(c) 2019 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:972 / 981
页数:10
相关论文
共 26 条
[1]  
Ankerst M, 1999, SIGMOD RECORD, VOL 28, NO 2 - JUNE 1999, P49
[2]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[3]  
Brahma Anitarani, 2015, International Journal of Reasoning-based Intelligent Systems, V7, P254
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]  
Breunig MM, 1999, LECT NOTES ARTIF INT, V1704, P262
[6]   A Hybrid System of Deep Learning and Learning Classifier System for Database Intrusion Detection [J].
Bu, Seok-Jun ;
Cho, Sung-Bae .
HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2017, 2017, 10334 :615-625
[7]  
Cohen W. W., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P115
[8]   NEAREST NEIGHBOR PATTERN CLASSIFICATION [J].
COVER, TM ;
HART, PE .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1967, 13 (01) :21-+
[9]  
Furnell SM, 2004, COMPUT FRAUD SECUR, P6
[10]  
Global fraud survey, 2017, 2016 REP NAT OCC FRA