Role-Based Profiling Using Fuzzy Adaptive Resonance Theory for Securing Database Systems

Role-Based Profiling Using Fuzzy Adaptive Resonance Theory for Securing Database Systems

Anitarani Brahma, Suvasini Panigrahi
Copyright: © 2021 |Pages: 13
DOI: 10.4018/IJAMC.2021040103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Very large amounts of time and effort have been invested by the research community working on database security to achieve high assurance of security and privacy. An important component of a secure database system is intrusion detection system which has the ability to successfully detect anomalous behavior caused by applications and users. However, modeling the normal behavior of a large number of users in a huge organization is quite infeasible and inefficient. The main purpose of this research investigation is thus to model the behavior of roles instead of users by applying adaptive resonance theory neural network. The observed behavior which deviates from any of the established role profiles is treated as malicious. The proposed model has the advantage of identifying insider threat and is applicable for large organizations as it is based on role profiling instead of user profiling. The proposed system is capable of detecting intrusion with high accuracy along with minimized false alarms.
Article Preview
Top

Existing research work on database intrusion detection has been considered from the literature since the beginning of the 1990s. In the last few years, a large number of efforts have been utilized in this framework due to the prevailing threat to databases. Most of the researches are based on anomaly intrusion detection which requires a reference model to profile the normal behavior of users that helps the DIDS in detecting intrusive activities.

Lee et al. considered the temporal objects to identify intrusions (V. C. S. Lee, Stankovic, & Son, 2000). Time semantics of temporal data objects are employed in the investigation for real-time intrusion detection. Barbara et al. used Hidden Markov Model and time series to build the behavioral model that captures the dynamic behavior of users (Barbará, Goel, & Jajodia, 2003). Lee et al. designed a signature-based DIDS to detect database intrusions by comparing incoming SQL statements against a set of genuine transaction fingerprints (S. Y. Lee, Low, & Wong, 2007). Hu et al. considers the data dependency relationship among the data item and mine them to detect intrusions (Hu & Panda, 2004). Srivastava et al. proposed data mining based DIDS that consider the sensitivity of attributes which are obtained by mining the existing weighted data dependency rules (Srivastava, Sural, & Majumdar, 2006). Bertino et al. utilized the concept of RBAC for the first time to model a variety of roles instead of individual user behaviors by mining the database log files (Bertino et al., 2005).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing