Expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases

被引:0
|
作者
Indu Singh
Rajni Jindal
机构
[1] Delhi Technological University,Department of Computer Science Engineering
来源
关键词
Database intrusion detection; Database security; Expectation maximization clustering; Data dependency mining; Sequential pattern mining; Anomaly detection;
D O I
暂无
中图分类号
学科分类号
摘要
Database security is pertinent to every organisation with the onset of increased traffic over large networks especially the internet and increase in usage of cloud based transactions and interactions. Greater exposure of organisations to the cloud implies greater risks for the organisational as well as user data. In this paper, we propose a novel approach towards database intrusion detection systems (DIDS) based on Expectation maximization Clustering and Sequential Pattern Mining (EMSPM). This approach unlike any other does not have records and assumes a predetermined policy to be maintained in an organisational database and can operate seamlessly on databases that follow Role Based Access Control as well as on those which do not conform to any such access control and restrictions. This is achieved by focusing on pre-existing logs for the database and using the Expectation maximization clustering algorithm to allot role profiles according to the database user’s activities. These clusters and patterns are then processed into an algorithm that prevents generation of unwanted rules followed by prevention of malicious transactions. Assessment into the accuracy of EMSPM over sets of synthetically generated transactions yielded propitious results with accuracies over 93%.
引用
收藏
页码:27649 / 27681
页数:32
相关论文
共 50 条
  • [41] From sequential pattern mining to structured pattern mining: A pattern-growth approach
    Han, JW
    Pei, J
    Yan, XF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (03) : 257 - 279
  • [42] From sequential pattern mining to structured pattern mining: A pattern-growth approach
    Jia-Wei Han
    Jian Pei
    Xi-Feng Yan
    Journal of Computer Science and Technology, 2004, 19 : 257 - 279
  • [43] Search Result Clustering Through Expectation Maximization Based Pruning of Terms
    Bindu, K. Hima
    Rao, C. Raghavendra
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2012), 2014, 236 : 1285 - 1292
  • [44] Sequential pattern mining in multi-databases via multiple alignment
    Kum, HC
    Chang, JH
    Wang, W
    DATA MINING AND KNOWLEDGE DISCOVERY, 2006, 12 (2-3) : 151 - 180
  • [45] Sampling for sequential pattern mining:: From static databases to data streams
    Raissi, Chedy
    Poncelet, Pascal
    ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 631 - +
  • [46] Mining Sequential Patterns from Probabilistic Databases by Pattern-Growth
    Muzammal, Muhammad
    ADVANCES IN DATABASES, 2011, 7051 : 118 - 127
  • [47] Sequential Pattern Mining in Multi-Databases via Multiple Alignment
    Hye-Chung Kum
    Joong Hyuk Chang
    Wei Wang
    Data Mining and Knowledge Discovery, 2006, 12 : 151 - 180
  • [48] CUSE: A Novel Cube-based Approach for Sequential Pattern Mining
    Sohrabi, Mohammad Karim
    Ghods, Vahid
    2016 4TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2016, : 186 - 190
  • [49] MINING SEQUENCE MOTIFS FROM PROTEIN DATABASES BASED ON A BIT PATTERN APPROACH
    Chang, Ye-In
    Wu, Chen-Chang
    Chen, Jiun-Rung
    Jeng, Yin-Han
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 647 - 657
  • [50] An Improved Approach for Sequential Utility Pattern Mining
    Lan, Guo-Cheng
    Hong, Tzung-Pei
    Tseng, Vincent S.
    Wang, Shyue-Liang
    2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), 2012, : 226 - 230