Abstract
In the current automation world, every organizations starting from education to industry and also in research organization are maintaining database and several security breaches are found in these databases. Traditional database security mechanism cannot handle the malicious access toward database. Although, various researches have been done in database intrusion detection, but most of the researches are limited in efficiency and accuracy. Inspired by human cognitive system, we present a database intrusion detection system using Adaptive Resonance Theory which is accompanied with some data mining techniques for preprocessing data. The proposed model can learn easily and cope up with the dynamic environment which entitles the system to detect both known and unknown patterns accurately with low false positive cost. The calculated simulation result shows that the database intrusion detection based on Adaptive Resonance Theory can accelerate the detection process with higher accuracy as compared to Self Organizing Map and Radial basis functional neural network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zadeh, L.A.: Soft computing and fuzzy logic. IEEE Softw. 11(6), 48–56 (1994)
Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A Data-Centric Approach to Insider Attack Detection in Database Systems. LNCS, vol. 6307, pp. 382–401 (2010)
Carpenter, G.A., Grossberg, S.: ART 2: self-organization of stable category recognition codes for analog input patterns. Appl. Opt. 26(23), 4919–4930 (http://cnsweb.bu.edu/Profiles/Grossberg/CarGro1987AppliedOptics.pdf) (1987)
Lee, V., Stankovic, J., Son, S.: Intrusion detection in real time databases via time signatures. In: Proceedings of the 6th IEEE Real-Time Technology and Applications Symposium, RTAS, pp. 124–133 (2000)
Rakesh, A., Ramakrishnan, S.: Fast algorithms for mining association rules. In: Proceedings of 20th International Conference on Very Large Data Bases. Morgan Kaufmann, Berlin, pp. 487–499 (1994)
Barbara, D., Goel, R., Jajodia, S.: Mining malicious data corruption with hidden Markov models. In: Proceedings of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, July 2002, pp. 175–189 (2002)
Zhong, Y., Qin, X.: Database intrusion detection based on user query frequent itemsets mining with item constraints. In: Proceeding of the 3rd International Conference on Information Security, pp. 224–225 (2004)
Bertino, E., Terzi, E., Kamra, A., Vakali, A.: Intrusion detection in RBAC-administered databases. In: Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), pp. 170–182 (2005)
Panigrahi, S., Sural, S., Majumdar, A.K.: Two-stage database intrusion detection by combining multiple evidence and belief update. Inf. Syst. Front. (2010)
Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10, 1–35 (2010)
Cho, S.: Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 32, 154–160 (2002)
Panigrahi, S., Sural, S.: Detection of Database Intrusion Using Two-Stage Fuzzy System. LNCS, vol. 5735, pp. 107–120 (2009)
Amini, M., Jalili, R., Shahriari, H.R.: RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25(6), 459–468 (2006)
Jang, J.S.R.: Neuro-Fuzzy and Soft Computing, 1st edn. PHI Publication. Pearson Education, New Delhi (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Brahma, A., Panigrahi, S. (2020). Database Intrusion Detection Using Adaptive Resonance Network Theory Model. In: Behera, H., Nayak, J., Naik, B., Pelusi, D. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 990. Springer, Singapore. https://doi.org/10.1007/978-981-13-8676-3_22
Download citation
DOI: https://doi.org/10.1007/978-981-13-8676-3_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8675-6
Online ISBN: 978-981-13-8676-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)