{"title":"Intrusion detection in role administrated database: Transaction-based approach","authors":"S. Darwish, S. Guirguis, Mahmoud M. Ghozlan","doi":"10.1109/ICCES.2013.6707175","DOIUrl":null,"url":null,"abstract":"Most of valuable information resources for all organizations are stored in database. It's a serious subject to protect this information against intruders. However, conventional security mechanisms haven't been designed to detect anomalous actions of database users. Intrusion detection systems (IDS) deliver an extra layer of security that cannot be guaranteed by built-in security tools. IDS provide the ideal solution to defend databases from intruders. In this paper, we suggest an anomaly detection approach that summarizes the raw transactional SQL queries into compact data structure called hexplet, which can model normal database access behavior (abstract the user's role profile) and recognize impostors specifically tailored for role-based access control (RBAC) database system. This hexplet allows us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry. Our target is to improve detection accuracy, specially the detection of those intruders inside the organization who behave strange behavior. Our model utilizes Naive Bayes Classifier (NBC) as a simple technique for evaluating the legitimacy of transaction. Experimental results show the performance of the proposed model in the term of error equal rate.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2013.6707175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Most of valuable information resources for all organizations are stored in database. It's a serious subject to protect this information against intruders. However, conventional security mechanisms haven't been designed to detect anomalous actions of database users. Intrusion detection systems (IDS) deliver an extra layer of security that cannot be guaranteed by built-in security tools. IDS provide the ideal solution to defend databases from intruders. In this paper, we suggest an anomaly detection approach that summarizes the raw transactional SQL queries into compact data structure called hexplet, which can model normal database access behavior (abstract the user's role profile) and recognize impostors specifically tailored for role-based access control (RBAC) database system. This hexplet allows us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry. Our target is to improve detection accuracy, specially the detection of those intruders inside the organization who behave strange behavior. Our model utilizes Naive Bayes Classifier (NBC) as a simple technique for evaluating the legitimacy of transaction. Experimental results show the performance of the proposed model in the term of error equal rate.