CID: a novel clustering-based database intrusion detection algorithm

被引:0
|
作者
Mohamad Reza Keyvanpour
Mehrnoush Barani Shirzad
Samaneh Mehmandoost
机构
[1] Alzahra University,Department of Computer Engineering, Faculty of Engineering
[2] Alzahra University,Data Mining Laboratory, Department of Computer Engineering, Faculty of Engineering
关键词
Intrusion; Intrusion detection; Database; Anomaly detection; Outlier detection; Density-based clustering;
D O I
暂无
中图分类号
学科分类号
摘要
At the same time with the increase in the data volume, attacks against the database are also rising, therefore information security and confidentiality became a critical challenge. One promised solution against malicious attacks is the intrusion detection system. In this paper, anomaly detection concept is used to propose a method for distinguishing between normal and abnormal activities. For this purpose, a new density-based clustering intrusion detection (CID) method is proposed which clusters queries based on a similarity measure and labels them as normal or intrusion. The experiments are conducted on two standard datasets including TPC-C and TPC-E. The results show proposed model outperforms state-of-the-art algorithms as baselines in terms of FN, FP, Precision, Recall and F-score measures.
引用
收藏
页码:1601 / 1612
页数:11
相关论文
共 50 条
  • [31] A novel hybrid bat algorithm with a fast clustering-based hybridization
    Sadegh Eskandari
    Mohammad Masoud Javidi
    Evolutionary Intelligence, 2020, 13 : 427 - 442
  • [32] A novel hybrid bat algorithm with a fast clustering-based hybridization
    Eskandari, Sadegh
    Javidi, Mohammad Masoud
    EVOLUTIONARY INTELLIGENCE, 2020, 13 (03) : 427 - 442
  • [33] A novel multimodal multiobjective memetic algorithm with a local detection mechanism and a clustering-based selection strategy
    Luo, Naili
    Ye, Yulong
    Lin, Wu
    Lin, Qiuzhen
    Leung, Victor C. M.
    MEMETIC COMPUTING, 2023, 15 (01) : 31 - 43
  • [34] A novel multimodal multiobjective memetic algorithm with a local detection mechanism and a clustering-based selection strategy
    Naili Luo
    Yulong Ye
    Wu Lin
    Qiuzhen Lin
    Victor C. M. Leung
    Memetic Computing, 2023, 15 : 31 - 43
  • [35] A clustering-based anomaly intrusion detector for a host computer
    Oh, SH
    Lee, WS
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (08): : 2086 - 2094
  • [36] An Adaptive Clustering Algorithm for Intrusion Detection
    QIU JuliNormal University of AnshanAnshanChina
    现代电子技术, 2007, (02) : 130 - 132
  • [37] An adaptive clustering algorithm for intrusion detection
    Wu, Guowei
    Yao, Lin
    Yao, Kai
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 1443 - 1447
  • [38] A Clustering Algorithm Oriented to Intrusion Detection
    Li Wei
    Yang Zhong-ming
    Chang Ya-ping
    Zhang Bin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 862 - 865
  • [39] An unsupervised clustering algorithm for intrusion detection
    Guan, Y
    Ghorbani, AA
    Belacel, N
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2671 : 616 - 617
  • [40] Relative network entropy based clustering algorithm for intrusion detection
    Qian, Quan
    Wang, Tianhong
    Zhan, Rui
    International Journal of Network Security, 2013, 15 (01) : 16 - 22