DocumentCode :
671831
Title :
Intrusion detection in role administrated database: Transaction-based approach
Author :
Darwish, Saad M. ; Guirguis, Shawkat K. ; Ghozlan, Mahmoud M.
Author_Institution :
Dept. of Inf. Technol. Inst. of Grad. Studies & Res. (IGSR), Alexandria Univ., Alexandria, Egypt
fYear :
2013
fDate :
26-28 Nov. 2013
Firstpage :
73
Lastpage :
79
Abstract :
Most of valuable information resources for all organizations are stored in database. It´s a serious subject to protect this information against intruders. However, conventional security mechanisms haven´t been designed to detect anomalous actions of database users. Intrusion detection systems (IDS) deliver an extra layer of security that cannot be guaranteed by built-in security tools. IDS provide the ideal solution to defend databases from intruders. In this paper, we suggest an anomaly detection approach that summarizes the raw transactional SQL queries into compact data structure called hexplet, which can model normal database access behavior (abstract the user´s role profile) and recognize impostors specifically tailored for role-based access control (RBAC) database system. This hexplet allows us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry. Our target is to improve detection accuracy, specially the detection of those intruders inside the organization who behave strange behavior. Our model utilizes Naive Bayes Classifier (NBC) as a simple technique for evaluating the legitimacy of transaction. Experimental results show the performance of the proposed model in the term of error equal rate.
Keywords :
Bayes methods; SQL; authorisation; pattern classification; query processing; IDS; NBC; RBAC database system; anomaly detection approach; compact data structure; error equal rate; hexplet; intrusion detection systems; naive Bayes classifier; normal database access behavior; raw transactional SQL queries; role administrated database; role-based access control database system; transaction-based approach; transaction-log entry; valuable information resources; Data structures; Database systems; Fingerprint recognition; Intrusion detection; Vectors; Anomaly detection; Database intrusion detection; Database security; Role-based profiling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering & Systems (ICCES), 2013 8th International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4799-0078-7
Type :
conf
DOI :
10.1109/ICCES.2013.6707175
Filename :
6707175
Link To Document :
بازگشت