Skip to main content

Particle Swarm Optimization-Based CNN-LSTM Networks for Anomalous Query Access Control in RBAC-Administered Model

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11734))

Abstract

As most organizations and companies depend on the database to process confidential information, database security has received considerable attention in recent years. In the database security category, access control is the selective restriction of access to the system or information only by the authorized user. However, access control is difficult to prevent information leakage by structured query language (SQL) statements created by internal attackers. In this paper, we propose a hybrid anomalous query access control system to extract the features of the access behavior by parsing the query log with the assumption that the DBA has role-based access control (RBAC) and to detect the database access anomalies in the features using the particle swarm optimization (PSO)-based CNN-LSTM network. The CNN hierarchy can extract important features for role classification in the vector of elements that have converted the SQL queries, and the LSTM model is suitable for representing the sequential relationship of SQL query statements. The PSO automatically finds the optimal CNN-LSTM hyperparameters for access control. Our CNN-LSTM method achieves nearly perfect access control performance for very similar roles that were previously difficult to classify and explains important variables that influence the role classification. Finally, the PSO-based CNN-LSTM networks outperform other state-of-the-art machine learning techniques in the TPC-E scenario-based virtual query dataset.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Rec. 38(3), 29–34 (2010)

    Article  Google Scholar 

  2. Dong, X., Li, X.: A novel distributed database solution based on MySQL. In: 7th International Conference on Information Technology in Medicine and Education (ITME), pp. 329–333 (2015)

    Google Scholar 

  3. Basharat, I., Azam, F., Muzaffar, A.W.: Database security and encryption: a survey study. Int. J. Comput. Appl. 47(12), 888–975 (2012)

    Google Scholar 

  4. Sarkar, K.R.: Assessing insider threats to information security using technical, behavioural and organizational measures. Inf. Secur. Tech. Rep. 15, 112–133 (2010)

    Article  Google Scholar 

  5. Kim, T.-Y., Cho, S.B.: Web traffic anomaly detection using C-LSTM neural networks. Expert Syst. Appl. 106, 66–76 (2018)

    Article  Google Scholar 

  6. Chen, C.M., Guan, D.J., Huang, Y.Z., Ou, Y.H.: Anomaly network intrusion detection using hidden Markov model. Int. J. Innovative Comput. Inf. Control (ICIC) 12(2), 569–580 (2016)

    Google Scholar 

  7. Islam, M.S., Kuzu, M., Kantarcioglu, M.: A dynamic approach to detect anomalous queries on relational databases. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 245–252 (2015)

    Google Scholar 

  8. Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)

    Article  Google Scholar 

  9. Puthran, S., Shah, K.: Intrusion detection using improved decision tree algorithm with binary and quad split. In: Mueller, P., Thampi, S.M., Alam Bhuiyan, M.Z., Ko, R., Doss, R., Alcaraz Calero, J.M. (eds.) SSCC 2016. CCIS, vol. 625, pp. 427–438. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3_37

    Chapter  Google Scholar 

  10. Dias, L.P., Cerqueira, J.J., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: Computer Science and Electronic Engineering (CEEC), pp. 145–150 (2017)

    Google Scholar 

  11. Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. Int. J. Eng. Res. Appl. (IJERA) 3(4), 1959–1964 (2013)

    Google Scholar 

  12. Aslahi-Shahri, B.M., et al.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)

    Article  Google Scholar 

  13. Ali, M.H., Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255–20261 (2018)

    Article  Google Scholar 

  14. Seo, Y.-G., Cho, S.-B., Yao, X.: The impact of payoff function and local interaction on the N-player iterated prisoner’s dilemma. Knowl. Inf. Syst. 2(4), 461–478 (2000)

    Article  Google Scholar 

  15. Cho, S.-B., Shimohara, K.: Evolutionary learning of modular neural networks with genetic programming. Appl. Intell. 9(3), 191–200 (1998)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by an Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean government (19ZS1110, Development of self-improving and human augmenting cognitive computing technology).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Bae Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, TY., Cho, SB. (2019). Particle Swarm Optimization-Based CNN-LSTM Networks for Anomalous Query Access Control in RBAC-Administered Model. In: Pérez García, H., Sánchez González, L., Castejón Limas, M., Quintián Pardo, H., Corchado Rodríguez, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2019. Lecture Notes in Computer Science(), vol 11734. Springer, Cham. https://doi.org/10.1007/978-3-030-29859-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29859-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29858-6

  • Online ISBN: 978-3-030-29859-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics