Detection of Malicious Transactions using Frequent Closed Sequential Pattern Mining and Modified Particle Swarm Optimization Clustering

被引:0
|
作者
Jindal, Rajni [1 ]
Singh, Indu [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Sci & Engn, New Delhi, India
关键词
Database security; Database intrusion detection; Sequential pattern mining; Role Profiles; Particle Swarm Optimization clustering; INTRUSION TRANSACTIONS;
D O I
10.1109/I2CT51068.2021.9418217
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In current times, with data security being recognised as an irrefutable requirement within an organisation, the importance of institution of intrusion detection system has grown manifolds. Identification of outsider attacks as well as misuse of database privileges by authorised entity has been a primary requirement in modern intrusion detection systems. In this paper we present BIDE (BI-Directional Extension) an efficient algorithm for mining frequent closed sequences without candidate maintenance and modified Particle Swarm Optimization clustering based malicious query detection (BPSOMQD), an advanced approach that detects and prevents malicious transactions from disrupting the consistency of the database. This method incorporates frequent closed sequential pattern mining which forms the basis for generation of data dependency rules. Further to recognise anomalous user activity, modified Particle Swarm Optimization algorithm is proposed which is used to generate role profiles associated with the transaction. A combination of Multilevel Rule Similarity Score (MRSS) between data dependency rules with incoming transaction and Cluster Similarity Index (CSI) with generated role profiles is considered to categorise the transaction as malicious or non-malicious. Experimental evaluation of proposed approach shows remarkable results on a characteristic banking database with accuracies over 92.37%.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
    Jindal, Rajni
    Singh, Indu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3937 - 3959
  • [2] Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
    Rajni Jindal
    Indu Singh
    Cluster Computing, 2022, 25 : 3937 - 3959
  • [3] Modified Particle Swarm Optimization for Pattern Clustering
    Swetha, K. P.
    Devi, V. Susheela
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT III, 2012, 7665 : 496 - 503
  • [4] Finding frequent trajectories by clustering and sequential pattern mining
    Arthur A.Shaw
    N.P.Gopalan
    Journal of Traffic and Transportation Engineering(English Edition) , 2014, (06) : 393 - 403
  • [5] Finding frequent trajectories by clustering and sequential pattern mining
    Shaw, Arthur A.
    Gopalan, N. P.
    JOURNAL OF TRAFFIC AND TRANSPORTATION ENGINEERING-ENGLISH EDITION, 2014, 1 (06) : 393 - 403
  • [6] Malicious sequential pattern mining for automatic malware detection
    Fan, Yujie
    Ye, Yanfang
    Chen, Lifei
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 : 16 - 25
  • [7] Fuzzy Frequent Pattern Mining from Gene Expression Data using Dynamic Multi-Swarm Particle Swarm Optimization
    Mishra, Shruti
    Mishra, Debahuti
    Satapathy, Sandeep Ku.
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 797 - 801
  • [8] Accelerated Frequent Closed Sequential Pattern Mining for uncertain data
    You, Tao
    Sun, Yue
    Zhang, Ying
    Chen, Jinchao
    Zhang, Peng
    Yang, Mei
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 204
  • [9] Customized Particle Swarm Optimization Algorithm for Frequent Itemset Mining
    Sukanya, N. S.
    Thangaiah, P. Ranjit Jeba
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 605 - 608
  • [10] Evaluation of Frequent Pattern Growth Based Fuzzy Particle Swarm Optimization Approach for Web Document Clustering
    Pamba, Raja Varma
    Sherly, Elizabeth
    Mohan, Kiran
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2017, PT I, 2017, 10404 : 372 - 384