Machine Learning Based Intrusion Detection on Complex Nested Transactional SQL Queries

被引:0
|
作者
Aliyu, Garba [1 ]
Thandekkattu, George [2 ]
Abdulmumin, Idris [1 ]
Baba, Usman A. [2 ]
Yusuf, Aminat Bolatito [3 ]
Nasir, Mustapha [4 ]
机构
[1] Ahmadu Bello Univ, Dept Comp Sci, Zaria, Nigeria
[2] Amer Univ Nigeria, Dept Comp Sci, Yola, Nigeria
[3] Usmanu Danfodiyo Univ, Dept Informat Commun & Technol, Sokoto, Nigeria
[4] Shehu Idris Coll Hlth Sci & Technol, Dept Comp Sci, Makarfi, Nigeria
关键词
Security; Intrusion; Detection; Integrity; Privacy;
D O I
10.1109/NIGERCON54645.2022.9803152
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
for many private and government sectors, such as education, banks, and businesses, a database has been a vital source of information storage. Many academics have focused on security issues such as privacy and integrity because of the extensive use of this database on the cloud. With an Intrusion Detection System (IDS), researchers have proposed security measures to detect unusual database user behavior. However, in a recent study, role-based, nested queries within transactional SQL queries have not been put into consideration. This work proposes the Multiplet data structure for identifying anomalies in nested transactional SQL queries. These queries are translated into the presented data structure, which models the use of the user's profile, therefore, detects intruders. This Multiplet allows us to compare transaction-log with SQL statements given by the user in an attempt to improve detection accuracy. The algorithm detects and reports the suspected invader if there is no link between the usual user queries and the suspicious issued queries. The results from the Naive Bayes Classifier (NBC) showed that 97% accuracy of intrusion was effectively detected. Moreover, a complex transactional database that tends to deviate from the usual user SQL queries were detected, which signifies the usefulness contribution in this paper.
引用
收藏
页码:146 / 150
页数:5
相关论文
共 50 条
  • [1] ATHENA++: Natural Language Querying for Complex Nested SQL Queries
    Sen, Jaydeep
    Lei, Chuan
    Quamar, Abdul
    Özcan, Fatma
    Efthymiou, Vasilis
    Dalmia, Ayushi
    Stager, Greg
    Mittal, Ashish
    Saha, Diptikalyan
    Sankaranarayanan, Karthik
    [J]. Proceedings of the VLDB Endowment, 2020, 13 (11): : 2747 - 2759
  • [2] Intrusion detection based on phishing detection with machine learning
    Jayaraj R.
    Pushpalatha A.
    Sangeetha K.
    Kamaleshwar T.
    Udhaya Shree S.
    Damodaran D.
    [J]. Measurement: Sensors, 2024, 31
  • [3] Intrusion detection method based on machine learning
    Tian, Xin-Guang
    Gao, Li-Zhi
    Zhang, Er-Yang
    [J]. Tongxin Xuebao/Journal on Communications, 2006, 27 (06): : 108 - 114
  • [4] Machine Learning Based Network Intrusion Detection
    Lee, Chie-Hong
    Su, Yann-Yean
    Lin, Yu-Chun
    Lee, Shie-Jue
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 79 - 83
  • [5] Intrusion detection system based on machine learning
    Wang, Xu-Ren
    Xu, Rong-Sheng
    [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (14): : 107 - 108
  • [6] IoT Intrusion Detection System Based on Machine Learning
    Xu, Bayi
    Sun, Lei
    Mao, Xiuqing
    Ding, Ruiyang
    Liu, Chengwei
    [J]. ELECTRONICS, 2023, 12 (20)
  • [7] Intrusion Detection Technology Based on Machine Learning Method
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5165 - 5168
  • [8] INTRUSION DETECTION BASED ON MACHINE LEARNING AND FEATURE SELECTION
    Alaoui, Souad
    El Gonnouni, Amina
    Lyhyaoui, Abdelouahid
    [J]. MENDEL 2011 - 17TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING, 2011, : 199 - 206
  • [9] Machine learning based intrusion detection system for IoMT
    Kulshrestha, Priyesh
    Vijay Kumar, T. V.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (05) : 1802 - 1814
  • [10] Anomaly Based Intrusion Detection for IoT with Machine Learning
    Shaver, Addison
    Liu, Zhipeng
    Thapa, Niraj
    Roy, Kaushik
    Gokaraju, Balakrishna
    Yuan, Xiaohon
    [J]. 2020 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR): TRUSTED COMPUTING, PRIVACY, AND SECURING MULTIMEDIA, 2020,