Database intrusion detection using role and user behavior based risk assessment

https://doi.org/10.1016/j.jisa.2020.102654Get rights and content

Highlights

  • A robust algorithm for DIDS which assesses risk associated with incoming transaction and selects the response from a suite of countermeasures.

  • A novel framework for creating user profiles based upon fingerprinting legitimate transactions for a user.

  • A novel method for agglomeration of different behavioral checks, i.e combining results of the user, role and temporal analysis as one.

Abstract

Present-day organizations continue to expose their critical information infrastructures over the Internet for facilitating accessibility; substantially raising concerns about the security of data from both outsiders and insiders. In this paper, we propose a novel approach for detecting intrusive attacks on databases by assessing the risk for incoming transaction based upon the conflation of multiple behavior-based components for the user. In a database intrusion detection system for a role-based access (RBAC) environment, it is not sufficient to focus on role-based features as every user within the same role has a degree of uniqueness. Moreover, traditional database intrusion detection systems classify the incoming transactions into two classes (Malicious or Non-malicious), taking the same action for all transactions that are labeled as malicious irrespective of the damage it can cause to the system. Our approach, Role and User Behavior-based Risk Assessment (RUBRA) uses both role-behavior and user-behavior based features for detecting an intrusive attack. Further, we also quantify the risk associated with the incoming transaction, streamlining the countermeasure process. Experiments on stochastic datasets show promising results on both detection and labeling of malicious transactions.

Introduction

Databases are an indispensable part of the working of organizations in the present era. The meteoric rise in adoption of database management systems as the primary structure to handle information can be ascribed to the increasing data volumes. It has been estimated that volume of business data worldwide, across all companies, doubles every 1.2 years [1]. With highly sensitive data and an increased online presence, the concerns regarding database security are at an all-time high. As more systems are brought online to improve accessibility, the susceptibility towards malicious attacks also increase. Along with substantial financial losses, estimated to be about $1.3 million [2], malicious attacks are also responsible for the degradation of public image and customer relationships of the organization.

The conventional security measures for protecting databases consist of features including but not limited to data encryption, auditing, authorization, enforcing separation of duties (SoD) policy, and fine-grained user level access. The approaches mentioned above prove efficacious in their respective use cases but fail to alleviate malicious insider attacks. A malicious insider can be an employee, contractor or a business partner that has or had access to an organization’s information infrastructure and purposefully supersedes or misuses the access in a manner which results in compromising the confidentiality, integrity or availability of the organization’s data [3], [4], [5].

The fundamental challenge in identification and mitigation of internal threat arises from the fact that intruders are authorized users of the system, having relevant access rights and familiarity with the parts of the database schema and the security mechanism that are in place. Therefore, insider threats can persist for long periods without being detected and cause considerable damages to database systems. Given the dynamic nature of the problem, we reckon that capturing user behavior is necessary for designing an effective intrusion detection system (IDS). Our work is not the first to employ user interactions and temporal patterns as features for creating an IDS, similar approaches have been employed in the past [6], [7], [8]. The novelty of our approach lies in the attributes that are used to build a user profile and the conflation of multiple behavioral patterns to arrive at a conclusion. The advantages of this approach are two-fold. Firstly, A considerable increase in the type of attacks that are captured. Secondly, An overall improvement in performance over traditional IDS.

Existing intrusion detection systems can be broadly categorized on the basis of features used to create the system i.e they either employ a data-centric approach [8], [9] or a syntax-centric approach [10], [11]. In this paper, we have assumed a syntax centric approach and our notion of behavior is based upon fingerprinting features from the SQL queries sent to the database by the user. The behavioral features such as locational (the geographical coordinates of database access), biological (such as typing speed) and query correlation are currently not in the scope of our work and will be considered in the future.

One of the widely followed approaches for alleviating misuse of assigned roles in an organization is RBAC [12] which regulates user access via permissions. In an RBAC model, the behavior of a user can be evaluated against two levels. First being the Role level, which captures how closely the current user transaction adheres to that of the users with a similar role i.e how closely the current user actions resemble those of the others with the same role. Typical approaches at this level use pattern mining to find consistent patterns in the previously stored legitimate transactions for all users with the same role [10], [13]. The queries present in the incoming transaction are then evaluated against the set of previously mined patterns and a conformance score is generated, This score is then used to label the incoming transactions as malicious or non-malicious based on a chosen threshold, in our discussion we refer to this score as role based similarity score (RBSS). While this approach is widely used, it also results in a number of false positives as the user’s individual behavior is not accounted for. Hence, at the second level, we capture the user’s unique behavior. The entities present at this level include features such as the count of sensitive elements accessed in the query and access frequency of the table. As in the role level, queries in the incoming transaction are evaluated against the stored attributes and a conformance score is assigned. Apart from features based upon SQL queries, the timestamp is employed to capture the temporal dimension of the behavior: the legitimate temporal access pattern. The timestamp of the incoming transaction is assigned a score based upon its proximity to the standard time of access by the user. Finally, the weighted average of the scores assigned at each level is computed, denoting the perceived probability of the transaction being malicious.

Existing database intrusion detection systems give binary judgment regarding the transaction i.e. either the transaction is malicious or non-malicious. While such an approach safeguards the database against threats adequately, it leads to degradation of user experience and unnecessary system overheard [14]. Since each incoming transaction if executed, will have a different impact on the system, IDS should also be capable of issuing different counter-measures, based on the severity of the situation. To widen the spectrum of countermeasures we introduce the concept of risk. Risk associated with a given transaction is a measure of the perceived damage to the system from the transaction being executed.

The range of risk values is then divided into bins and appropriate countermeasures are assigned for each category. In a real-world scenario, countermeasures are assigned based upon the opinion of DBA and the SME. For each incoming transaction, based upon its perceived risk, a different action is taken, streamlining the response process. To the best of our knowledge, this is the first attempt to integrate risk in host-based intrusion detection for databases.

The major contributions of this work are as follows:

  • It presents a novel approach for creating a user profile based on upon fingerprinting legitimate transactions committed by the user.

  • It presents a novel method for agglomeration of different behavioral checks, i.e combining results of the user, role and temporal analysis into one unified parameter.

  • It proposes a robust database intrusion detection system which assesses risk associated with incoming transaction and selects the response from a spectrum of countermeasures.

The rest of the paper is composed as follows. An overview of the related work is given in Section 2. Section 3 describes the proposed approach. Experimental results and comparison with existing approaches are given in Section 4. Lastly, we state the conclusion in Section 5.

Section snippets

Related work

Over the past few decades, the research in the field of database intrusion detection has been accelerating, with a large number of works iteratively developing and improving upon the approaches of their precedents. The existing IDS can be broadly categorized into two classes: signature-based [6], [15] and anomaly-based detection [10], [16], [17]. A signature-based IDS looks for attack signatures or specific patterns that usually indicate malicious or suspicious intent. It is essential for the

Role and user behavior based intrusion detection system

We propose a binate approach towards quantitatively identifying the risk associated with the incoming transaction and suggesting a countermeasure based on its severity. The algorithm assumes RBAC policy is implemented in the organization’s database. The model learns the behavior of the user on both the individual level and role level, these, along with the features extracted from the incoming transaction are used to obtain the associated risk value and the relevant action based on its severity.

Results and discussion

For evaluating the efficacy of the proposed approach, we conducted several experiments on synthetically generated transactions aimed towards a conventional banking database which confirms to the TPC-C schema (Transaction Processing Performance Council 2002) [51]. In the schema, we have segregated the attributes into three levels based upon their sensitivity, i.e., low, medium, and high with the quantitative ratio being 4:2:1. In this section, we first describe our transaction generation

Conclusion and future work

Facilitating the access of sensitive organizational data to users over the Internet makes it necessary to employ relevant security measures for the safety of data. In this paper, we propose a novel intrusion detection system for RBAC administered databases that utilizes the behavior of users at both role level and individual level to identify the incoming malicious transactions. At the role level, transactional patterns mined from database logs are employed, while at the user level, profile of

CRediT authorship contribution statement

Indu Singh: Conceptualization, Supervision, Methodology, Writing, Validation, Review & editing. Narendra Kumar: Supervision, Review & editing. Srinivasa K.G.: Conceptualization, Supervision, Methodology, Validation, Review & editing. Tript Sharma: Dataset preparation, Implementation, Methodology, Software, Validation, Writing. Vaibhav Kumar: Dataset preparation, Implementation, Methodology, Software, Validation, Writing. Siddharth Singhal: Dataset preparation, Implementation, Methodology,

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Indu Singh is an Assistant Professor in Computer Science Engineering Department at the Delhi Technological University, Delhi. Singh has received her B.Tech in Computer Science & Engineering and an M.Tech degree in Information Security from Ambedkar Institute of Advanced Communication Technologies & Research, Guru Gobind Singh Indraprastha University, Govt. of NCT Delhi in 2012. She is currently pursuing her Ph.D in Computer Science and Engineering, specializing in Data Mining and Information

References (51)

  • CherdantsevaY. et al.

    A review of cyber security risk assessment methods for SCADA systems

    Comput Secur

    (2016)
  • SmithT.F. et al.

    Identification of common molecular subsequences

    J Mol Biol

    (1981)
  • NeedlemanS.B. et al.

    A general method applicable to the search for similarities in the amino acid sequence of two proteins

    J Mol Biol

    (1970)
  • Software Engineering InstituteA.J.

    Analytic approaches to detect insider threats

    (2015)
  • CappelliD.M. et al.

    The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)

    (2012)
  • BertinoE. et al.

    Database security-concepts, approaches, and challenges

    IEEE Trans Dependable Secure Comput

    (2005)
  • LeeV.C. et al.

    Intrusion detection in real-time database systems via time signatures

  • PanigrahiS. et al.

    Two-stage database intrusion detection by combining multiple evidence and belief update

    Inf Syst Front

    (2013)
  • SunY. et al.

    A data-driven evaluation for insider threats

    Data Sci Eng

    (2016)
  • MathewS. et al.

    A data-centric approach to insider attack detection in database systems

  • HuY. et al.

    A data mining approach for database intrusion detection

  • SrivastavaA. et al.

    Database intrusion detection using weighted sequence mining

    J Comput

    (2006)
  • SandhuR.S. et al.

    Role-based access control models

    Computer

    (1996)
  • BertinoE. et al.

    Intrusion detection in RBAC-administered databases

  • KanounW. et al.

    Advanced reaction using risk assessment in intrusion detection systems

  • Cited by (8)

    View all citing articles on Scopus

    Indu Singh is an Assistant Professor in Computer Science Engineering Department at the Delhi Technological University, Delhi. Singh has received her B.Tech in Computer Science & Engineering and an M.Tech degree in Information Security from Ambedkar Institute of Advanced Communication Technologies & Research, Guru Gobind Singh Indraprastha University, Govt. of NCT Delhi in 2012. She is currently pursuing her Ph.D in Computer Science and Engineering, specializing in Data Mining and Information Security at CSE Department, Delhi Technological University. Her research interests include Database Systems, Data Mining, Information Security, Machine Learning, Fuzzy systems and Swarm Intelligence. She has published papers in International conferences and Journals of IEEE, Elsevier, Springer and ACM. She has also received IEEE Best Paper Award in ICACCI-2016. Singh has also served as a reviewer for several conferences of IEEE and Springer in India and abroad.

    Prof. Narendra Kumar obtained his B.Sc. Engineering and M.Sc. Engineering from Aligarh Muslim University, Aligarh during the year 1984 and 1987 respectively. He completed his Ph.D. degree from University of Roorkee, Roorkee, India in 1995. Presently he is Professor, Department of Electrical Engineering, Delhi Technological University, Delhi, India. He has published more than 250 research papers in reputed journals and conferenne proceedings. He has been awarded Pandit Madan Mohan Malviya Memorial Prize during the years 1995 and 2018. He has also been awarded K.F. Antia Memorial Medal during the year 2001.His area of interest are Power System Operation & Control, Flexible AC Transmission Systems, AGC, and Voltage Stabiliy etc.

    Dr. Srinivasa K.G. is currently working as a Professor at NITTTR, Chandigarh. He received his Ph.D. in Computer Science and Engineering from Bangalore University in 2007. He is the recipient of All India Council for Technical Education – Career Award for Young Teachers, Indian Society of Technical Education – ISGITS National Award for Best Research Work Done by Young Teachers, Institution of Engineers (India) – IEI Young Engineer Award in Computer Engineering, RajarambapuPatil National Award for Promising Engineering Teacher Award from ISTE – 2012, IMS Singapore – Visiting Scientist Fellowship Award. He has published more than 150 research papers in International Conferences and Journals. He has visited many Universities abroad as a visiting researcher – He has visited University of Oklahoma, USA, Iowa State University, USA, Hong Kong University, Korean University, National University of Singapore, University of British Columbia, Canada are his few prominent visits. He has authored eight text books in the area of Internet of Things, Data Analytics, Soft Computing, Social Network Analysis, High Performance Computing, R Programming etc with prestigious international publishers like Springer, TMH, Oxford, Cenage, and IGI Global. He has edited research monographs in the area of Cyber Physical Systems, Fog Computing and Energy Aware Computing with CRC Press and IGI Global. He has been awarded BOYSCAST Fellowship by DST, Govt. of India, for post doctoral fellowship at University of Melbourne, Australia towards conducting collaborative Research with Clouds Laboratory in the area of Cloud Computing. He is the principal Investigator for many funded projects from AICTE, UGC, DRDO, and DST. He is the senior member of IEEE and ACM. His research areas include Data Mining, Machine Learning, IOT, Cloud Computing and Digital Pedagogy. His recent research areas include Innovative Teaching Practices in Engineering Education, pedagogy; outcomes based education, and teaching philosophy.

    Tript Sharma is a final year undergraduate pursuing Mechanical Engineering from Delhi Technological University, Delhi, India. His research interests include Machine Learning, Data Mining, Deep Learning, and Artificial Intelligence in Healthcare and Robotics. Earlier, he had been a research intern at the Defence Research and Development Organisation (DRDO), India and the Central Drug Research Institute, India.

    Vaibhav Kumar is a final year undergraduate pursuing a bachelor’s degree in Computer Science Engineering at Delhi Technological University, Delhi, India. His research interests include Information Security, Deep learning, Fairness in Machine Learning, and Natural Language Processing. He has also worked as a research associate at IIT-Kanpur.

    Siddharth Singhal is a final year undergraduate pursuing a bachelor’s degree in Computer Science Engineering at Delhi Technological University, Delhi, India. His research interests include Deep Learning, Machine Learning, Data Mining, Information Security. He interned at Tower Research Capital as a Core Engineering intern.

    View full text