A Hybrid Database Intrusion Detection Algorithm Using Swarm Intelligence and Radial Basis Function Network

Recently, all over the globe, intrusion detection especially in Database gaining lots of attentions from researchers as it serves a security support system to existing security mechanism. This paper presents a hybrid intrusion detection algorithm in Database System by making use of swarm intelligence and radial basis function network. Both these techniques are combined to produce better detection results. The performance of the proposed approach is investigated with synthetic dataset and is compared with other machine learning technique and found to be significantly better

[1]  M. Dorigo,et al.  1 Positive Feedback as a Search Strategy , 1991 .

[2]  Victor C. S. Lee,et al.  Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.

[3]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[4]  Shamik Sural,et al.  Two-stage database intrusion detection by combining multiple evidence and belief update , 2013, Inf. Syst. Frontiers.

[5]  Dervis Karaboga,et al.  AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .

[6]  Rakesh Agarwal,et al.  Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.

[8]  Yan Lu,et al.  Short-Term Power Load Point Prediction Based on the Sharp Degree and Chaotic RBF Neural Network , 2015 .

[9]  Shamik Sural,et al.  Detection of Database Intrusion Using a Two-Stage Fuzzy System , 2009, ISC.

[10]  Yong Zhong,et al.  Database intrusion detection based on user query frequent itemsets mining with item constraints , 2004, InfoSecu '04.

[11]  Jing Wang,et al.  Swarm Intelligence in Cellular Robotic Systems , 1993 .

[12]  Georgios Kambourakis,et al.  Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..

[13]  Elisa Bertino,et al.  Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[14]  Sung-Bae Cho,et al.  Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.

[15]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[16]  R. Sivakumar,et al.  Ant-based Clustering Algorithms: A Brief Survey , 2010 .

[17]  M. Sailaja,et al.  A Novel Approach for Intrusion Detection Using Swarm Intelligence , 2012 .