Detection of Malicious Transaction in Database Using Log Mining Approach
Title | Detection of Malicious Transaction in Database Using Log Mining Approach |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Pathan, A.C., Potey, M.A. |
Conference Name | Electronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on |
Date Published | Jan |
Keywords | anomalous database transactions, automatic discovery, Computers, data mining, data sequence rules, Database Security, Database systems, domain dependency rules, Intrusion detection, log mining approach, malicious transaction detection, query database, query structures, relational databases, security of data, SQL, Training |
Abstract | Data mining is the process of finding correlations in the relational databases. There are different techniques for identifying malicious database transactions. Many existing approaches which profile is SQL query structures and database user activities to detect intrusion, the log mining approach is the automatic discovery for identifying anomalous database transactions. Mining of the Data is very helpful to end users for extracting useful business information from large database. Multi-level and multi-dimensional data mining are employed to discover data item dependency rules, data sequence rules, domain dependency rules, and domain sequence rules from the database log containing legitimate transactions. Database transactions that do not comply with the rules are identified as malicious transactions. The log mining approach can achieve desired true and false positive rates when the confidence and support are set up appropriately. The implemented system incrementally maintain the data dependency rule sets and optimize the performance of the intrusion detection process. |
DOI | 10.1109/ICESC.2014.50 |
Citation Key | 6745384 |
- Intrusion Detection
- Training
- SQL
- security of data
- relational databases
- query structures
- query database
- malicious transaction detection
- log mining approach
- anomalous database transactions
- domain dependency rules
- Database systems
- Database Security
- data sequence rules
- Data mining
- Computers
- automatic discovery