Database Intrusion Detection Using Adaptive Resonance Network Theory Model

In the current automation world, every organizations starting from education to industry and also in research organization are maintaining database and several security breaches are found in these databases. Traditional database security mechanism cannot handle the malicious access toward database. Although, various researches have been done in database intrusion detection, but most of the researches are limited in efficiency and accuracy. Inspired by human cognitive system, we present a database intrusion detection system using Adaptive Resonance Theory which is accompanied with some data mining techniques for preprocessing data. The proposed model can learn easily and cope up with the dynamic environment which entitles the system to detect both known and unknown patterns accurately with low false positive cost. The calculated simulation result shows that the database intrusion detection based on Adaptive Resonance Theory can accelerate the detection process with higher accuracy as compared to Self Organizing Map and Radial basis functional neural network.

[1]  Yong Zhong,et al.  Database intrusion detection based on user query frequent itemsets mining with item constraints , 2004, InfoSecu '04.

[2]  Sung-Bae Cho,et al.  Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.

[3]  Erkan Topal,et al.  Decision support system of unplanned dilution and ore-loss in underground stoping operations using a neuro-fuzzy system , 2015, Appl. Soft Comput..

[4]  Lotfi A. Zadeh,et al.  Soft computing and fuzzy logic , 1994, IEEE Software.

[5]  Sushil Jajodia,et al.  Mining Malicious Corruption of Data with Hidden Markov Models , 2002, DBSec.

[6]  Shamik Sural,et al.  Detection of Database Intrusion Using a Two-Stage Fuzzy System , 2009, ISC.

[7]  Shamik Sural,et al.  Two-stage database intrusion detection by combining multiple evidence and belief update , 2013, Inf. Syst. Frontiers.

[8]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[9]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[10]  Victor C. S. Lee,et al.  Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.

[11]  Morteza Amini,et al.  RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..

[12]  Hung Q. Ngo,et al.  A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.

[13]  Elisa Bertino,et al.  Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).