Title :
Database intrusion detection using sequential data mining approaches
Author :
Abd Elaziz, P.E. ; Sobh, M. ; Mohamed, H.K.
Author_Institution :
Dept. of Comput. & Syst. Eng., Ain Shams Univ., Cairo, Egypt
Abstract :
The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.
Keywords :
data mining; security of data; apriori algorithms; computer security; database intrusion detection; descriptive data mining; predictive data mining; sequential data mining techniques; Accuracy; Heuristic algorithms; Itemsets; Sequential data mining; anomaly detection; apriori algorithms; computer security; descriptive data mining; host-based intrusion detection; intrusion detection; malicious transaction; misuse detection; network-based intrusion detection; predictive data mining;
Conference_Titel :
Computer Engineering & Systems (ICCES), 2014 9th International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4799-6593-9
DOI :
10.1109/ICCES.2014.7030937