Expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases

被引:0
|
作者
Indu Singh
Rajni Jindal
机构
[1] Delhi Technological University,Department of Computer Science Engineering
来源
关键词
Database intrusion detection; Database security; Expectation maximization clustering; Data dependency mining; Sequential pattern mining; Anomaly detection;
D O I
暂无
中图分类号
学科分类号
摘要
Database security is pertinent to every organisation with the onset of increased traffic over large networks especially the internet and increase in usage of cloud based transactions and interactions. Greater exposure of organisations to the cloud implies greater risks for the organisational as well as user data. In this paper, we propose a novel approach towards database intrusion detection systems (DIDS) based on Expectation maximization Clustering and Sequential Pattern Mining (EMSPM). This approach unlike any other does not have records and assumes a predetermined policy to be maintained in an organisational database and can operate seamlessly on databases that follow Role Based Access Control as well as on those which do not conform to any such access control and restrictions. This is achieved by focusing on pre-existing logs for the database and using the Expectation maximization clustering algorithm to allot role profiles according to the database user’s activities. These clusters and patterns are then processed into an algorithm that prevents generation of unwanted rules followed by prevention of malicious transactions. Assessment into the accuracy of EMSPM over sets of synthetically generated transactions yielded propitious results with accuracies over 93%.
引用
收藏
页码:27649 / 27681
页数:32
相关论文
共 50 条
  • [1] Expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases
    Singh, Indu
    Jindal, Rajni
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27649 - 27681
  • [2] Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases
    Singh, Indu
    Jindal, Rajni
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11101 - 11133
  • [3] Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases
    Indu Singh
    Rajni Jindal
    The Journal of Supercomputing, 2023, 79 : 11101 - 11133
  • [4] Detecting intrusive transactions in databases using partially-ordered sequential rule mining and fractional-distance based anomaly detection
    Singh, Indu
    Manuja, Minkush
    Mathur, Rishabh
    Goswami, Mononito
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2020, 8 (02) : 138 - 171
  • [5] Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
    Jindal, Rajni
    Singh, Indu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3937 - 3959
  • [6] Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining
    Rajni Jindal
    Indu Singh
    Cluster Computing, 2022, 25 : 3937 - 3959
  • [7] EMU: An expectation maximization based approach for clustering uncertain data
    Qin, Biao
    Xia, Yuni
    Li, Fang
    Ge, Jiaqi
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2013, 25 (04) : 1067 - 1083
  • [8] Navigation patterns mining approach based on expectation maximization algorithm
    Mustapha, Norwati
    Jalali, Manijeh
    Bozorgniya, Abolghasem
    Jalali, Mehrdad
    World Academy of Science, Engineering and Technology, 2009, 38 : 883 - 887
  • [9] Constraint Based Sequential Pattern Mining in Time Series Databases - A two Way Approach
    Radhakrishna, Vangipuram
    Srinivas, Chintakindi
    Rao, C. V. Guru
    2013 AASRI CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL, 2013, 4 : 313 - 318
  • [10] Pre-clustering based sequential pattern mining
    Wu, SC
    Wu, GF
    Jin, SJ
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 1008 - 1013