Abstract
As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administrators can limit unauthorized user access through role-based access control system, while masquerade attacks from insiders are often less noticeable. Therefore, the research on database anomaly detection based on user behavior has important practical application value. In this paper, we proposed the anomaly detection system for securing database. We took advantage of a user profile construction method to describe database user query statements without user grouping. Then k-means and random tree were applied to the user profile. With the specified user profile constructed according to the characteristics of the query submitted by the user, the k-means is used to group the users. Then random tree algorithm is used to train anomaly detector. The experimental results show that this method proposed is fast and effective for detecting anomaly of database user behaviors.
This work is supported by the science and technology project of State Grid Corporation of China “Research on Key Technologies of dynamic identity security authentication and risk control in power business “ (Grand No. 5700-201972227A-0-0-00).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
IBM: Ponemon Institute: 2018 Cost of a data breach study: a global overview. https://www.ibm.com/security/data-breach. Accessed 15 Aug 2019
Verizon RISK Team: Data breach investigations report. https://enterprise.verizon.com/resources/reports/DBIR_2018_Report_execsummary.pdf. Accessed 25 Dec 2019
Na, W.: Anomaly detection and assessment of user behavior for database access. M.S. thesis, Southeast Univ., Jiangsu, China (2017)
Dapeng, C.: Intrusion detection system of database based on user behavior of analysis and identification. M.S. thesis, Univ. of Electronic Science and Technology, Sichuan, China (2015)
Xiqiang, D.: Research on database intrusion detection based on data mining. M.S. thesis, Jiangsu Univ., Jiangsu, China (2009)
Li, N., Tripunitara, M.V.: Security analysis in role-based access control. In: Proceedings of ACM SACMAT, New York, YK, USA, pp. 126–135 (2004)
Ni, Q., et al.: Privacy-aware role-based access control. In: Proceedings of ACM SACMAT, New York, YK, USA, pp. 41–50 (2007)
Haddad, M., et al.: Access control for data integration in presence of data dependencies. In: Proceedings of DASFAA, Switzerland, pp. 203–217 (2014)
Abiteboul, S., Bourhis, P., Vianu, V.: A formal study of collaborative access control in distributed datalog. In: Proceedings of 11th International Conference on Digital Telecommunications, pp. 1–17. Xpert Publishing Services, Lisbon, Portugal (2016)
Bossi, L., Bertino, E., Hussain, S.R.: A system for profiling and monitoring database access patterns by application programs for anomaly detection. IEEE Trans. Softw. Eng. 43(5), 415–431 (2017)
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: 7th Conference on USENIX Security Symposium, San Antonio, Texas, USA, pp. 26–29. USENIX Association, Berkeley (1998)
Geng, J., et al.: A novel clustering algorithm for database anomaly detection. In: Proceedings on Security and Privacy in Communication Networks, Dallas, USA, pp. 682–696 (2015)
Karami, A.: An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Exp. Syst. Appl. 108, 36–60 (2018)
Roh, J., Lee, S., Kim, S.: Anomaly detection of access patterns in database. In: Proceedings on Information and Communication Technology Convergence (ICTC), Jeju, South Korea, pp. 1112–1115 (2015)
Bossi, L., Bertino, E., Hussain, S.R.: A system for profiling and monitoring database access patterns by application programs for anomaly detection. IEEE Trans. Softw. Eng. 43, 415–431 (2016)
Chen, Y., Nyemba, S., Malin, B.: Detecting anomalous insiders in collaborative information systems. IEEE Trans. Depend. Secure Comput. 9(3), 332–344 (2012)
Wurzenberger, M., et al.: Incremental clustering for semi-supervised anomaly detection applied on log data. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1–6. ACM, Reggio Calabria Italy (2017)
Sun, X., Yang, G., Zhang, J.: A Real-time detection scheme of user behavior anomaly for management information system. In: Proceedings of IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, pp. 1054–1058. (2020)
Karami, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. J. Very Large Data Base 17(5), 1063–1077 (2008)
Sallam, A., Fadolalkarim, D., Bertino, E., et al.: Data and syntax centric anomaly detection for relational databases. J. Data Mining Knowl. Disc. 6(6), 231–239 (2016)
Java Code Examples for weka.classifiers.trees.RandomTree. https://www.programcreek.com/java-api-examples/index.php?api=weka.classifiers.trees.RandomTree. Accessed 01 mar 2019
Ronao, C.A., Cho, SB.: Mining SQL queries to detect anomalous database access using random forest and PCA. In: Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence, Seoul, South Korea, pp. 151–160 (2015)
Islam, S.M., Kuzu, M., Kantarcioglu, M.: A dynamic approach to detect anomalous queries on relational databases. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, Texas, USA, pp. 245–252 (2015)
TPC Benchmark C Standard Specification Revision 5.11. http://www.tpc.org/tpc_documents_current_versions/pdf/tpc-c_v5.11.0.pdf. 15 Sep 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, X., Fang, Z., Wang, D., Feng, A., Wang, Q. (2020). Research on Database Anomaly Access Detection Based on User Profile Construction. In: Xu, G., Liang, K., Su, C. (eds) Frontiers in Cyber Security. FCS 2020. Communications in Computer and Information Science, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9739-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-15-9739-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9738-1
Online ISBN: 978-981-15-9739-8
eBook Packages: Computer ScienceComputer Science (R0)