Anomaly Detection in Role Administered Relational Databases — A Novel Method

A significant amount of attempt has been lately committed for the progress of Database Management Systems (DBMS) that ensures high assertion and high security. Common security measures for database like access control measures, validation, encryption technologies, etc are not sufficient enough to secure the data from all the threats. By using an anomaly detection system, we are able to enhance the security feature of the Database management system. We are taking an assumption that the database access control is role based. In this paper, a mechanism is proposed for finding the anomaly in database by using machine learning technique such as classification. The importance of providing anomaly detection technique to a Role-Based Access Control database is that it will help for the protection against the insider attacks. The experimentation results shows that the system is able to detect intrusion effectively with high accuracy and high F1-score.

[1]  Hung Q. Ngo,et al.  A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.

[2]  Kandasamy Muniasamy,et al.  Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm , 2015 .

[3]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[4]  Archana Nair,et al.  Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications? , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[5]  Yao Yuan,et al.  Study of database intrusion detection based on improved association rule algorithm , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[6]  Elisa Bertino,et al.  Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.

[7]  K. R. Kavitha,et al.  Applying improved svm classifier for leukemia cancer classification using FCBF , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[8]  N. Radhika,et al.  A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms , 2014, The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014).

[9]  Xiaohua Li,et al.  An Immune Based Relational Database Intrusion Detection Algorithm , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.

[10]  Giovanni Vigna,et al.  A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.

[11]  Dhiren R. Patel,et al.  Machine learning proposed approach for detecting database intrusions in RBAC enabled databases , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[12]  Saad M. Darwish,et al.  Machine learning approach to detect intruders in database based on hexplet data structure , 2016 .

[13]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[14]  Saad M. Darwish,et al.  Intrusion detection in role administrated database: Transaction-based approach , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).

[15]  R. Remya,et al.  A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[16]  Pranita Jain,et al.  A different approach of intrusion detection and Response System for Relational Databases , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).

[17]  Murat Kantarcioglu,et al.  A Dynamic Approach to Detect Anomalous Queries on Relational Databases , 2015, CODASPY.

[18]  Christopher Krügel,et al.  Anomaly detection of web-based attacks , 2003, CCS '03.