• DocumentCode
    256381
  • Title

    Database intrusion detection using sequential data mining approaches

  • Author

    Abd Elaziz, P.E. ; Sobh, M. ; Mohamed, H.K.

  • Author_Institution
    Dept. of Comput. & Syst. Eng., Ain Shams Univ., Cairo, Egypt
  • fYear
    2014
  • fDate
    22-23 Dec. 2014
  • Firstpage
    104
  • Lastpage
    111
  • Abstract
    The procedure of detecting any violation or trespass on the level of information in a database depends on placing the normal behaviors and practices of operations done by a transaction Afterwards, any identified pattern or behavior other than those normal patterns could be of high potential of being considered as an intrusion or violation. One of the known problems in this process is that, the accuracy of the process of detecting the frequent patterns in the database, as the algorithm applied may not detect all the patterns and this would affect in two ways. First, the database of the normal patterns would be missing. Second, some new patterns would be missed in the detection process. This paper studies and implements different sequential data mining techniques, and then proposes a new enhanced algorithm. The proposed algorithm increases the accuracy of the process and the number of detected patterns. Finally, the paper proposes a model for database intrusion detection based on the modified algorithm. The paper uses a realistic huge database for evaluating the performance and the accuracy.
  • Keywords
    data mining; security of data; apriori algorithms; computer security; database intrusion detection; descriptive data mining; predictive data mining; sequential data mining techniques; Accuracy; Heuristic algorithms; Itemsets; Sequential data mining; anomaly detection; apriori algorithms; computer security; descriptive data mining; host-based intrusion detection; intrusion detection; malicious transaction; misuse detection; network-based intrusion detection; predictive data mining;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering & Systems (ICCES), 2014 9th International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-4799-6593-9
  • Type

    conf

  • DOI
    10.1109/ICCES.2014.7030937
  • Filename
    7030937