Nothing Special   »   [go: up one dir, main page]

Skip to main content

CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1142))

Included in the following conference series:

Abstract

The relational database is designed to store and process large amount of information such as business records and personal data. There are many policies and access control techniques for database security, but they are not sufficient for detecting insider attacks. In order to detect threats for the database application, it is necessary to adopt role-based access control (RBAC) and classify the roles according to the authority of each user. In this paper, we propose a method of classifying user’s role and authority using the CNN-LSTM neural networks by extracting features from SQL queries. In the anomaly detection method, CNN automatically extracts important features from database query and LSTM models the temporal information of the SQL sequence. The class activation map also identifies the SQL query features that affect the classification. Experiments with the TPC-E scenario-based benchmark query dataset show that the CNN-LSTM neural networks surpass other state-of-the-art machine learning methods, achieving an overall accuracy of 93.3% and recall of 88.7%. We also identify the characteristics of misclassification data through statistical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secure Comput. 1, 2–19 (2005)

    Article  Google Scholar 

  2. Ni, Q., et al.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 24–34 (2010)

    Article  Google Scholar 

  3. Li, D., Liu, C., Wei, Q., Liu, Z., Liu, B.: RBAC-based access control for SaaS systems. In: International Conference on Information Engineering and Computer Science (ICIECS), pp. 1–4 (2010)

    Google Scholar 

  4. Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16–24 (2013)

    Article  Google Scholar 

  5. Chen, S., et al.: TPC-E vs. TPC-C: Characterizing the new TPC-E benchmark via an I/O comparison study. ACM SIGMOD Rec. 39(3), 5–10 (2011)

    Article  Google Scholar 

  6. Ramachandran, R., Arya, P., Jayanthy, P.G.: A novel method for intrusion detection in relational databases. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 230–235 (2017)

    Google Scholar 

  7. Kumar, G.R., Mangathayaru, N., Narasimha, G.: An improved k-means clustering algorithm for intrusion detection using Gaussian function. In: International Conference on Engineering & MIS, pp. 69–79 (2015)

    Google Scholar 

  8. Horng, S.J., et al.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306–313 (2011)

    Article  Google Scholar 

  9. Ronao, C.A., Cho, S.-B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)

    Article  Google Scholar 

  10. Rai, K., Devi, M.S., Guleria, G.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(4), 2828–2838 (2016)

    Google Scholar 

  11. Mulay, S.A., Devale, P.R., Garje, G.B.: Intrusion detection system using support vector machine and decision tree. Int. J. Comput. Appl. 3(3), 40–43 (2010)

    Google Scholar 

  12. Kim, J.-Y., Cho, S.-B.: Exploiting deep convolutional neural networks for a neural-based learning classifier system. Neurocomputing 354, 61–70 (2019)

    Article  Google Scholar 

  13. Qiu, C., Shan, J., Shandong, B.: Research on intrusion detection algorithm based on BP neural network. Int. J. Secur. Appl. 9(4), 247–258 (2015)

    Google Scholar 

  14. Devaraju, S., Ramakrishnan, S.: Detection of accuracy for intrusion detection system using neural network classifier. Int. J. Emerg. Technol. Adv. Eng. 3(1), 338–345 (2013)

    Google Scholar 

  15. Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2921–2929 (2016)

    Google Scholar 

  16. Kim, T.-Y., Cho, S.-B.: Particle swarm optimization-based CNN-LSTM networks for anomalous query access control in RBAC-administered model. In: Pérez García, H., Sánchez González, L., Castejón Limas, M., Quintián Pardo, H., Corchado Rodríguez, E. (eds.) HAIS 2019. LNCS (LNAI), vol. 11734, pp. 123–132. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29859-3_11

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported by the grant funded by 2019 IT promotion fund (Development of AI based Precision Medicine Emergency System) of the Korea government (Ministry of Science and ICT).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Bae Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, TY., Cho, SB. (2019). CNN-LSTM Neural Networks for Anomalous Database Intrusion Detection in RBAC-Administered Model. In: Gedeon, T., Wong, K., Lee, M. (eds) Neural Information Processing. ICONIP 2019. Communications in Computer and Information Science, vol 1142. Springer, Cham. https://doi.org/10.1007/978-3-030-36808-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36808-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36807-4

  • Online ISBN: 978-3-030-36808-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics