• DocumentCode
    671831
  • Title

    Intrusion detection in role administrated database: Transaction-based approach

  • Author

    Darwish, Saad M. ; Guirguis, Shawkat K. ; Ghozlan, Mahmoud M.

  • Author_Institution
    Dept. of Inf. Technol. Inst. of Grad. Studies & Res. (IGSR), Alexandria Univ., Alexandria, Egypt
  • fYear
    2013
  • fDate
    26-28 Nov. 2013
  • Firstpage
    73
  • Lastpage
    79
  • Abstract
    Most of valuable information resources for all organizations are stored in database. It´s a serious subject to protect this information against intruders. However, conventional security mechanisms haven´t been designed to detect anomalous actions of database users. Intrusion detection systems (IDS) deliver an extra layer of security that cannot be guaranteed by built-in security tools. IDS provide the ideal solution to defend databases from intruders. In this paper, we suggest an anomaly detection approach that summarizes the raw transactional SQL queries into compact data structure called hexplet, which can model normal database access behavior (abstract the user´s role profile) and recognize impostors specifically tailored for role-based access control (RBAC) database system. This hexplet allows us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry. Our target is to improve detection accuracy, specially the detection of those intruders inside the organization who behave strange behavior. Our model utilizes Naive Bayes Classifier (NBC) as a simple technique for evaluating the legitimacy of transaction. Experimental results show the performance of the proposed model in the term of error equal rate.
  • Keywords
    Bayes methods; SQL; authorisation; pattern classification; query processing; IDS; NBC; RBAC database system; anomaly detection approach; compact data structure; error equal rate; hexplet; intrusion detection systems; naive Bayes classifier; normal database access behavior; raw transactional SQL queries; role administrated database; role-based access control database system; transaction-based approach; transaction-log entry; valuable information resources; Data structures; Database systems; Fingerprint recognition; Intrusion detection; Vectors; Anomaly detection; Database intrusion detection; Database security; Role-based profiling;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering & Systems (ICCES), 2013 8th International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-4799-0078-7
  • Type

    conf

  • DOI
    10.1109/ICCES.2013.6707175
  • Filename
    6707175