Abstract
A database Intrusion Detection System (IDS) based on Role-based Access Control (RBAC) mechanism that has capability of learning and adaptation learns SQL transaction patterns represented by roles to detect insider attacks. In this paper, we parameterize the rules for partitioning the entire query set into multiple areas with simple chromosomes and propose an ensemble of multiple deep learning models that can effectively model the tree structural characteristics of SQL transactions. Experimental results on a large synthetic query dataset verify that it quantitatively outperforms other ensemble methods and machine learning methods including deep learning models, in terms of 10-fold cross validation and chi-square validation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mathew, S., Petropoulos, M., Ngo, Hung Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 382–401. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15512-3_20
Murray, M.C.: Database security: what students need to know. J. Inf. Technol. Educ. Innovates Pract. 9, 44–61 (2010)
Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579–2605 (2008)
Buehrer, G., Weide, B.W., Sivilotti, P.A.: Using parse tree validation to prevent SQL injection attacks, In: Proceedings of the 5th International Workshop on Software Engineering and Middleware, pp. 106–113 (2005)
Bockermann, C., Apel, M., Meier, M.: Learning SQL for database intrusion detection using context-sensitive modelling, In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 196–205 (2009)
Xue, B., Zhang, M., Browne, W.N., Yao, X.: A survey on evolutionary computation approaches to feature selection. IEEE Trans. Evol. Comput. 4, 606–626 (2016)
Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 123–140, (2005)
Ramasubramanian, P., Kannan, A.: A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Soft Comput. 10, 699–714 (2006)
Pinzon, C.I., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL: Intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231, 15–31 (2013)
Kim, M.Y., Lee, D.H.: Data-mining based SQL injection attack detection using internal query trees. Expert Syst. Appl. 41, 5416–5430 (2014)
Alom, Z., Bontupalli, V.R., Taha, T.M.: Intrusion detection using deep belief network and extreme learning machine. Int. J. Monitoring Surveillance Technol. Res. 3, 35–56 (2015)
Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)
Bu, S.J., Cho, S.B.: A hybrid system of deep learning and learning classifier systems for database intrusion detection, In: International Conference on Hybrid Artificial Intelligence Systems, pp. 615–625 (2017)
Cho, S.B., Shimohara, K.: Evolutionary learning of modular neural networks with genetic programming. Appl. Intell. 9, 191–200 (1998)
Urbanowicz, R.J., Moore, J.H.: Learning classifier systems: a complete introduction, review and roadmap. J. Artif. Evol. Appl. 1, 1–25 (2009)
Holland, John H.: What is a learning classifier system? In: Lanzi, P.L., Stolzmann, W., Wilson, Stewart W. (eds.) IWLCS 1999. LNCS (LNAI), vol. 1813, pp. 3–32. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45027-0_1
Seo, Y.G., Cho, S.B., Yao, X.: The impact of payoff function and local interaction on the N-player iterated prisoner’s dilemma. Knowl. Inf. Syst. 2, 461–478 (2000)
Rippel, O., Snoek, J., Adams, R.P.: Spectral representations for convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 2449–2457 (2015)
Sainath, T.N., Parada, C.: Convolutional neural networks for small-footprint keyword spotting, In: 16th Annual Conference of International Speech Communication Association (2015)
Transaction Process Performance Council (TPC), TPC Benchmark E, Standard Specification Ver. 1.0 (2014)
Acknowledgements
This research was supported by Korea Electric Power Corporation (Grant number: R18XA05).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Bu, SJ., Cho, SB. (2019). Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack. In: Pérez GarcÃa, H., Sánchez González, L., Castejón Limas, M., Quintián Pardo, H., Corchado RodrÃguez, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2019. Lecture Notes in Computer Science(), vol 11734. Springer, Cham. https://doi.org/10.1007/978-3-030-29859-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-29859-3_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29858-6
Online ISBN: 978-3-030-29859-3
eBook Packages: Computer ScienceComputer Science (R0)