Expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases

被引:0
|
作者
Indu Singh
Rajni Jindal
机构
[1] Delhi Technological University,Department of Computer Science Engineering
来源
关键词
Database intrusion detection; Database security; Expectation maximization clustering; Data dependency mining; Sequential pattern mining; Anomaly detection;
D O I
暂无
中图分类号
学科分类号
摘要
Database security is pertinent to every organisation with the onset of increased traffic over large networks especially the internet and increase in usage of cloud based transactions and interactions. Greater exposure of organisations to the cloud implies greater risks for the organisational as well as user data. In this paper, we propose a novel approach towards database intrusion detection systems (DIDS) based on Expectation maximization Clustering and Sequential Pattern Mining (EMSPM). This approach unlike any other does not have records and assumes a predetermined policy to be maintained in an organisational database and can operate seamlessly on databases that follow Role Based Access Control as well as on those which do not conform to any such access control and restrictions. This is achieved by focusing on pre-existing logs for the database and using the Expectation maximization clustering algorithm to allot role profiles according to the database user’s activities. These clusters and patterns are then processed into an algorithm that prevents generation of unwanted rules followed by prevention of malicious transactions. Assessment into the accuracy of EMSPM over sets of synthetically generated transactions yielded propitious results with accuracies over 93%.
引用
收藏
页码:27649 / 27681
页数:32
相关论文
共 50 条
  • [21] Detecting and exploiting symmetries in sequential pattern mining
    Nekkache, Ikram
    Jabbour, Said
    Kamel, Nadjet
    Sais, Lakhdar
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2022, 14 (04) : 309 - 334
  • [22] High average-utility sequential pattern mining based on uncertain databases
    Lin, Jerry Chun-Wei
    Li, Ting
    Pirouz, Matin
    Zhang, Ji
    Fournier-Viger, Philippe
    KNOWLEDGE AND INFORMATION SYSTEMS, 2020, 62 (03) : 1199 - 1228
  • [23] High average-utility sequential pattern mining based on uncertain databases
    Jerry Chun-Wei Lin
    Ting Li
    Matin Pirouz
    Ji Zhang
    Philippe Fournier-Viger
    Knowledge and Information Systems, 2020, 62 : 1199 - 1228
  • [24] Detecting Intrusive Behaviors using Swarm-based Fuzzy Clustering Approach
    Mishra, Debasmita
    Naik, Bighnaraj
    SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 837 - 846
  • [25] Web Personalization Services Based on Clustering And Contiguous Sequential Pattern Mining
    Cui, Wei
    Fang, Wei
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 775 - 780
  • [26] Clustering-based multidimensional sequential pattern mining of semantic trajectories
    Sakouhi, Thouraya
    Akaichi, Jalel
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2024, 16 (02) : 148 - 175
  • [27] Segmenting customer transactions using a pattern-based clustering approach
    Yang, YH
    Padmanabhan, B
    THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 411 - 418
  • [28] Expectation-Maximization (EM) Clustering as a Preprocessing Method for Clinical Pathway Mining
    TsumotonAff, Shusaku
    Kimura, Tomohiro
    Hirano, Shoji
    REVIEW OF SOCIONETWORK STRATEGIES, 2022, 16 (01): : 25 - 52
  • [29] Detection of Malicious Transactions using Frequent Closed Sequential Pattern Mining and Modified Particle Swarm Optimization Clustering
    Jindal, Rajni
    Singh, Indu
    2021 6TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2021,
  • [30] Stability region based Expectation Maximization for model-based clustering
    Reddy, Chandan K.
    Chiang, Hsiao-Dong
    Rajaratnam, Bala
    ICDM 2006: SIXTH INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2006, : 522 - 531