Skip to main content

Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack

  • Conference paper
  • First Online:
Hybrid Artificial Intelligent Systems (HAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11734))

Included in the following conference series:

Abstract

A database Intrusion Detection System (IDS) based on Role-based Access Control (RBAC) mechanism that has capability of learning and adaptation learns SQL transaction patterns represented by roles to detect insider attacks. In this paper, we parameterize the rules for partitioning the entire query set into multiple areas with simple chromosomes and propose an ensemble of multiple deep learning models that can effectively model the tree structural characteristics of SQL transactions. Experimental results on a large synthetic query dataset verify that it quantitatively outperforms other ensemble methods and machine learning methods including deep learning models, in terms of 10-fold cross validation and chi-square validation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mathew, S., Petropoulos, M., Ngo, Hung Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 382–401. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15512-3_20

    Chapter  Google Scholar 

  2. Murray, M.C.: Database security: what students need to know. J. Inf. Technol. Educ. Innovates Pract. 9, 44–61 (2010)

    Google Scholar 

  3. Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579–2605 (2008)

    MATH  Google Scholar 

  4. Buehrer, G., Weide, B.W., Sivilotti, P.A.: Using parse tree validation to prevent SQL injection attacks, In: Proceedings of the 5th International Workshop on Software Engineering and Middleware, pp. 106–113 (2005)

    Google Scholar 

  5. Bockermann, C., Apel, M., Meier, M.: Learning SQL for database intrusion detection using context-sensitive modelling, In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 196–205 (2009)

    Chapter  Google Scholar 

  6. Xue, B., Zhang, M., Browne, W.N., Yao, X.: A survey on evolutionary computation approaches to feature selection. IEEE Trans. Evol. Comput. 4, 606–626 (2016)

    Article  Google Scholar 

  7. Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 123–140, (2005)

    Chapter  Google Scholar 

  8. Ramasubramanian, P., Kannan, A.: A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Soft Comput. 10, 699–714 (2006)

    Article  Google Scholar 

  9. Pinzon, C.I., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL: Intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231, 15–31 (2013)

    Article  Google Scholar 

  10. Kim, M.Y., Lee, D.H.: Data-mining based SQL injection attack detection using internal query trees. Expert Syst. Appl. 41, 5416–5430 (2014)

    Article  Google Scholar 

  11. Alom, Z., Bontupalli, V.R., Taha, T.M.: Intrusion detection using deep belief network and extreme learning machine. Int. J. Monitoring Surveillance Technol. Res. 3, 35–56 (2015)

    Article  Google Scholar 

  12. Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)

    Article  Google Scholar 

  13. Bu, S.J., Cho, S.B.: A hybrid system of deep learning and learning classifier systems for database intrusion detection, In: International Conference on Hybrid Artificial Intelligence Systems, pp. 615–625 (2017)

    Google Scholar 

  14. Cho, S.B., Shimohara, K.: Evolutionary learning of modular neural networks with genetic programming. Appl. Intell. 9, 191–200 (1998)

    Article  Google Scholar 

  15. Urbanowicz, R.J., Moore, J.H.: Learning classifier systems: a complete introduction, review and roadmap. J. Artif. Evol. Appl. 1, 1–25 (2009)

    Google Scholar 

  16. Holland, John H.: What is a learning classifier system? In: Lanzi, P.L., Stolzmann, W., Wilson, Stewart W. (eds.) IWLCS 1999. LNCS (LNAI), vol. 1813, pp. 3–32. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45027-0_1

    Chapter  Google Scholar 

  17. Seo, Y.G., Cho, S.B., Yao, X.: The impact of payoff function and local interaction on the N-player iterated prisoner’s dilemma. Knowl. Inf. Syst. 2, 461–478 (2000)

    Article  Google Scholar 

  18. Rippel, O., Snoek, J., Adams, R.P.: Spectral representations for convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 2449–2457 (2015)

    Google Scholar 

  19. Sainath, T.N., Parada, C.: Convolutional neural networks for small-footprint keyword spotting, In: 16th Annual Conference of International Speech Communication Association (2015)

    Google Scholar 

  20. Transaction Process Performance Council (TPC), TPC Benchmark E, Standard Specification Ver. 1.0 (2014)

    Google Scholar 

Download references

Acknowledgements

This research was supported by Korea Electric Power Corporation (Grant number: R18XA05).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sung-Bae Cho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bu, SJ., Cho, SB. (2019). Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack. In: Pérez García, H., Sánchez González, L., Castejón Limas, M., Quintián Pardo, H., Corchado Rodríguez, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2019. Lecture Notes in Computer Science(), vol 11734. Springer, Cham. https://doi.org/10.1007/978-3-030-29859-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29859-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29858-6

  • Online ISBN: 978-3-030-29859-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics