An Overview of Database Centred Intrusion Detection Systems
@inproceedings{Adebowale2013AnOO, title={An Overview of Database Centred Intrusion Detection Systems}, author={Ajayi Adebowale and A IdowuS. and Otusile Oluwabukola}, year={2013} }
Intrusion detection systems have become a major component of network security infrastructures. Modern day intrusion detection systems are to be reliable, extensible, adaptive to the flow of network traffic and to have a low cost of maintenance. Over the years researchers have looked upon data mining as a means of enhancing the adaptability of an intrusion detection system, as it enables the IDS to discover patterns of intrusions and define valid bounds of network traffic. Despite the…
No Paper Link Available
Figures from this paper
6 Citations
Learning Classifier Systems for Adaptive Learning of Intrusion Detection System
- Computer ScienceSOCO-CISIS-ICEUTE
- 2017
This paper applies accuracy based learning classifier systems to relational database and confirms that adaptive learning is possible and confirmed their practical usability that they close to the best accuracy, though were not the best.
Learning Classifier Systems for Adaptive Learning of Intrusion Detection System
- Computer Science
- 2017
This paper applies accuracy based learning classifier systems to relational database and confirms that adaptive learning is possible and confirmed their practical usability that they close to the best accuracy, though were not the best.
Anomalous query access detection in RBAC-administered databases with random forest and PCA
- Computer ScienceInf. Sci.
- 2016
Learning Bayesian Network to Predict Group Emotion in Kindergarten by Evolutionary Computation
- Computer ScienceSOCO-CISIS-ICEUTE
- 2017
A method to learn the bayesian network for group emotion prediction in kindergarten from data through evolutionary computation, and compares the evolution of the best model to analyze the influential factors that determine the structure.
Applying accuracy-based LCS to detecting anomalous database access
- Computer ScienceGECCO
- 2018
In the problem of database intrusion detection which changes the detecting targets, the patterns of rule generation are found and analyzed to show systemically how the adaptive learning of XCS algorithm is working in practical usage.
A Comparison of Data Mining Techniques for Anomaly Detection in Relational Databases
- Computer ScienceICDS 2015
- 2015
Evaluated feature selection and data mining algorithms in the context of database IDS show that principal components analysis produces a reasonably compact and meaningful subset of features while graphical models like decision trees, random forest, and Bayesian networks yield a consistently high performance in detecting anomalies in databases.
References
SHOWING 1-10 OF 24 REFERENCES
Creation and deployment of data mining-based intrusion detection systems in Oracle Database l0g
- Computer ScienceFourth International Conference on Machine Learning and Applications (ICMLA'05)
- 2005
DAID is described, a database-centric architecture that leverages data mining within the Oracle RDBMS to address these challenges and offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability.
A framework for constructing features and models for intrusion detection systems
- Computer ScienceTSEC
- 2000
A novel framework, MADAM ID, for Mining Audit Data for Automated Models for Instrusion Detection, which uses data mining algorithms to compute activity patterns from system audit data and extracts predictive features from the patterns.
Architecture for Data Collection in Database Intrusion Detection Systems
- Computer ScienceSecure Data Management
- 2007
A new approach to data collection for database IDSs is presented by situating data collecting sensors on the database server and having the data transmitted to the audit server on a physically different site for further processing.
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
- Computer ScienceICETE
- 2004
This paper presents an overview of the work in creating a practical database intrusion detection system that detects a wide range of specific and general forms of misuse, provides detailed reports, and has a low false-alarm rate.
Adaptive Model Generation
- Computer ScienceApplications of Data Mining in Computer Security
- 2002
Adaptive Model Generation (AMG) is presented, a real time architecture for implementing data mining-based intrusion detection systems by automating the collection of data, the generation and deployment of detection models, and the real-time evaluation of data.
Weighted Intra-transactional Rule Mining for Database Intrusion Detection
- Computer SciencePAKDD
- 2006
This paper proposes an intrusion detection algorithm named weighted data dependency rule miner (WDDRM) for finding dependencies among the data items and shows that WDDRM handles the modification of sensitive attributes quite accurately.
Database Intrusion Detection using Weighted Sequence Mining
- Computer ScienceJ. Comput.
- 2006
An algorithm for finding dependencies among important data items in a relational database management system and an extension to the Entity- Relationship (E-R) model to syntactically capture the sensitivity levels of the attributes is proposed.
Intrusion detection in RBAC-administered databases
- Computer Science21st Annual Computer Security Applications Conference (ACSAC'05)
- 2005
The preliminary experimental evaluation on both real and synthetic database traces show that the proposed ID mechanisms work well in practical situations, and the use of roles makes the approach usable even for databases with large user population.
Intrusion detection in real-time database systems via time signatures
- Computer ScienceProceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000
- 2000
The authors describe a method for intrusion detection applied to real time database systems that will be tagged with "time semantics" that capture expectations about update rates that are unknown to the intruders.
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System
- Computer ScienceADBIS
- 2004
A framework for highly distributed real-time monitoring approach to database security using Intelligent Multi-Agents and a combination of both statistical anomaly prevention and rule based misuse prevention in order to detect a misuser.