CID: a novel clustering-based database intrusion detection algorithm

被引:0
作者
Mohamad Reza Keyvanpour
Mehrnoush Barani Shirzad
Samaneh Mehmandoost
机构
[1] Alzahra University,Department of Computer Engineering, Faculty of Engineering
[2] Alzahra University,Data Mining Laboratory, Department of Computer Engineering, Faculty of Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2021年 / 12卷
关键词
Intrusion; Intrusion detection; Database; Anomaly detection; Outlier detection; Density-based clustering;
D O I
暂无
中图分类号
学科分类号
摘要
At the same time with the increase in the data volume, attacks against the database are also rising, therefore information security and confidentiality became a critical challenge. One promised solution against malicious attacks is the intrusion detection system. In this paper, anomaly detection concept is used to propose a method for distinguishing between normal and abnormal activities. For this purpose, a new density-based clustering intrusion detection (CID) method is proposed which clusters queries based on a similarity measure and labels them as normal or intrusion. The experiments are conducted on two standard datasets including TPC-C and TPC-E. The results show proposed model outperforms state-of-the-art algorithms as baselines in terms of FN, FP, Precision, Recall and F-score measures.
引用
收藏
页码:1601 / 1612
页数:11
相关论文
共 48 条
[1]  
Bland JM(1996)Statistics notes: measurement error BMJ 312 1654-225
[2]  
Altman DG(2013)Adversarial attacks against intrusion detection systems: taxonomy, solutions and open issues Inf Sci 239 201-17
[3]  
Corona I(2011)Supervised anomaly detection using clustering based normal behaviour modeling Int J Adv Eng Sci 1 12-240
[4]  
Giacinto G(2013)A survey of text similarity approaches Int J Comput Appl 68 13-270
[5]  
Roli F(2011)Density-based Clustering WIREs Data Min Knowl Discov 1 231-1077
[6]  
Gogoi P(2013)A two-phase hybrid of semi-supervised and active learning approach for sequence labeling Intell Data Anal 17 251-191
[7]  
Borah B(2008)Detecting anomalous access patterns in relational databases VLDB J 17 1063-300
[8]  
Bhattacharyyac D(2010)Database intrusion detection using sequence alignment Int J Inf Secur 9 179-714
[9]  
Gomaa WH(2015)An analytical review of XML association rules mining Artif Intell Rev 43 277-370
[10]  
Fahmy AA(2017)Community detection in social network by using a multi-objective evolutionary algorithm Intell Data Anal 21 385409-47