• DocumentCode
    2431792
  • Title

    Hybrid Approach for Database Intrusion Detection with Reactive Policies

  • Author

    Shedge, Rajashree ; Ragha, Lata

  • Author_Institution
    Ramrao Adik Inst. of Technol., Navi Mumbai, India
  • fYear
    2012
  • fDate
    3-5 Nov. 2012
  • Firstpage
    724
  • Lastpage
    729
  • Abstract
    Database systems are the important assets of the information system infrastructure in most organizations. The databases may contain invaluable sensitive information and unauthorized transaction could cause a lot of harm. In this paper, we proposed a Hybrid Reactive Database Intrusion Detection System that detects known as well as new database intrusions. We used an improved Apriori algorithm for mining association rules from the user behaviour. It analyses the associations between various parameters of the user activities. This improved Apriori algorithm is considered to make the data mining process faster. Reactive policies are adopted for the detected intrusions. These policies are created based on the severity of an intrusion and an appropriate response is generated for the users who performed intrusive activity. This approach enhances the database security by generating more selective and more sensitive rules, and by providing faster decision, faster performance.
  • Keywords
    authorisation; data mining; database management systems; transaction processing; apriori algorithm; association analysis; association rule mining; data mining process; database security; hybrid reactive database intrusion detection system; information system infrastructure; intrusion severity; intrusive activity; reactive policies; selective rules; sensitive information; sensitive rules; unauthorized transaction; user activity parameters; user behaviour; Association rules; Intrusion detection; Itemsets; Monitoring; Training; Anomaly detection; Apriori Algorithm; Database; Intrusion Detection System; Misuse detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
  • Conference_Location
    Mathura
  • Print_ISBN
    978-1-4673-2981-1
  • Type

    conf

  • DOI
    10.1109/CICN.2012.126
  • Filename
    6375208