CID: a novel clustering-based database intrusion detection algorithm

被引:0
|
作者
Keyvanpour, Mohamad Reza [1 ]
Barani Shirzad, Mehrnoush [2 ]
Mehmandoost, Samaneh [1 ]
机构
[1] Alzahra Univ, Dept Comp Engn, Fac Engn, Tehran, Iran
[2] Alzahra Univ, Dept Comp Engn, Data Min Lab, Fac Engn, Tehran, Iran
关键词
Intrusion; Intrusion detection; Database; Anomaly detection; Outlier detection; Density-based clustering; USER;
D O I
10.1007/s12652-020-02231-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At the same time with the increase in the data volume, attacks against the database are also rising, therefore information security and confidentiality became a critical challenge. One promised solution against malicious attacks is theintrusion detectionsystem. In this paper, anomaly detection concept is used to propose a method for distinguishing between normal and abnormal activities. For this purpose, a new density-based clustering intrusion detection (CID) method is proposed which clusters queries based on a similarity measure and labels them as normal or intrusion. The experiments are conducted on two standard datasets including TPC-C and TPC-E. The results show proposed model outperforms state-of-the-art algorithms as baselines in terms of FN, FP, Precision, Recall and F-score measures.
引用
收藏
页码:1601 / 1612
页数:12
相关论文
共 50 条
  • [1] CID: a novel clustering-based database intrusion detection algorithm
    Mohamad Reza Keyvanpour
    Mehrnoush Barani Shirzad
    Samaneh Mehmandoost
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 1601 - 1612
  • [2] CLUSTERING-BASED NETWORK INTRUSION DETECTION
    Zhong, Shi
    Khoshgoftaar, Taghi M.
    Seliya, Naeem
    [J]. INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2007, 14 (02) : 169 - 187
  • [3] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    [J]. 2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [4] A Mixed Unsupervised Clustering-based Intrusion Detection Model
    Zhang, Cuixiao
    Zhang, Guobing
    Sun, Shanshan
    [J]. THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 426 - 428
  • [5] An improved unsupervised clustering-based intrusion detection method
    Hai, YJ
    Wu, Y
    Wang, GY
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 52 - 60
  • [7] A Clustering-Based Unsupervised Approach to Anomaly Intrusion Detection
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 202 - 205
  • [8] A Clustering-Based Method for Intrusion Detection in Web Servers
    Pereira, Hermano
    Jamhour, Edgard
    [J]. 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2013,
  • [9] Entropy clustering-based granular classifiers for network intrusion detection
    Hui Liu
    Gang Hao
    Bin Xing
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [10] Entropy clustering-based granular classifiers for network intrusion detection
    Liu, Hui
    Hao, Gang
    Xing, Bin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)