A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Authors

Abstract:

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks in both database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find dependency and sequence rules. The main advantage of this system, in comparison with the previous database intrusion detection systems, is that it can detect malicious behaviors in both transaction and inter-transaction levels. Also, it gains advantages of a hybrid method, including specification-based detection and anomaly detection, to minimize both false positive and false negative alarms. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experiment results demonstrate that the true positive rate (recall metric) is higher than 80%, and the false positive rate is lower than 10% per different data sets and choosing appropriate ranges for support and confidence thresholds. The experimental evaluation results show high accuracy and effectiveness of the proposed system.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Collective Fraud Detection Capturing Inter-Transaction Dependency

In e-commerce, different payment transactions have different levels of risk. Risk is generally higher for digital goods, but it also differs based on product and its popularity, the offer type (packaged game, virtual currency to a game or subscription service), storefront and geography. Existing fraud policies and models make decisions independently for each transaction based on transaction att...

full text

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

full text

Inter- and Intra-Transaction Parallelism in Database Systems

This paper presents an approach to improving database performance by combining parallelism of multiple independent transactions and parallelism of multiple sub-transactions within a transaction. An experimental prototype has been built that supports this combination of inter-and intra-transaction parallelism based on the framework of multi-level transaction management. A performance study for a...

full text

A Data Mining with Hybrid Approach Based Transaction Risk Score Generation Model (TRSGM) for Fraud Detection of Online Financial Transaction

We propose a unique and hybrid approach containing data mining techniques, artificial intelligence and statistics in a single platform for fraud detection of online financial transaction, which combines evidences from current as well as past behavior. The proposed transaction risk generation model (TRSGM) consists of five major components, namely, DBSCAN algorithm, Linear equation, Rules, Data ...

full text

Database Availability for Transaction Processing

Modern businesses store A transaction processing critical data in database system relies on its management systems. Much database management of the daily activity system to supply high of business includes availability. Digital manipulation of data offers a network-based in the database. As product, the VAX DBMS businesses extend their system, and a relational operations worldwide, data-based p...

full text

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 6  issue 2

pages  155- 167

publication date 2014-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023