Insider attack detection in database with deep metric neural network with Monte Carlo sampling

Author:

Go Gwang-Myong1,Bu Seok-Jun2,Cho Sung-Bae2

Affiliation:

1. Yonsei University Department of Computer Science, , Seoul 03722, South Korea and Samsung Electronics, Co., Ltd., Suwon 16706, South Korea

2. Yonsei University Department of Computer Science, , Seoul 03722, South Korea

Abstract

Abstract Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a deep metric neural network with strategic sampling algorithm that properly extracts salient features and directly learns a quantitative measure of similarity. A strategic sampling method of heuristically generating and learning training pairs through Monte Carlo search is proposed to select a training pair that can represent the entire dataset. With the TPC-E–based benchmark data trained with 11,000 queries for 11 roles, the proposed model produces the classification accuracy of 95.41%, which is the highest compared with the previous models. The results are verified through comparison of quantitative and qualitative evaluations, and the feature space modelled in the neural network is analysed by t-SNE algorithm.

Publisher

Oxford University Press (OUP)

Subject

Logic

Reference29 articles.

1. A data-centric approach to insider attack detection in database systems;Mathew;International Workshop on Recent Advances in Intrusion Detection,2010

2. Database security: what students need to know;Murray;Journal of Information Technology Education: Innovates in Practice,2010

3. Architecture for Data Collection in Database Intrusion Detection Systems

4. Database security: concepts, approaches and challenges;Bertino;IEEE Transactions on Dependable and Secure Computing,2005

5. Proposed NIST standard for role-based access control;Ferraiolo;Security,2001

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems;Logic Journal of the IGPL;2024-05-14

2. Research Opportunity of Insider Threat Detection based on Machine Learning Methods;2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC);2023-02-20

3. Evaluating Classifiers’ Performance to Detect Attacks in Website Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05

4. Dimensionality-Reduction Methods for the Analysis of Web Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05

5. An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3