Abstract
As most organizations and companies depend on the database to process confidential information, database security has received considerable attention in recent years. In the database security category, access control is the selective restriction of access to the system or information only by the authorized user. However, access control is difficult to prevent information leakage by structured query language (SQL) statements created by internal attackers. In this paper, we propose a hybrid anomalous query access control system to extract the features of the access behavior by parsing the query log with the assumption that the DBA has role-based access control (RBAC) and to detect the database access anomalies in the features using the particle swarm optimization (PSO)-based CNN-LSTM network. The CNN hierarchy can extract important features for role classification in the vector of elements that have converted the SQL queries, and the LSTM model is suitable for representing the sequential relationship of SQL query statements. The PSO automatically finds the optimal CNN-LSTM hyperparameters for access control. Our CNN-LSTM method achieves nearly perfect access control performance for very similar roles that were previously difficult to classify and explains important variables that influence the role classification. Finally, the PSO-based CNN-LSTM networks outperform other state-of-the-art machine learning techniques in the TPC-E scenario-based virtual query dataset.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shmueli, E., Vaisenberg, R., Elovici, Y., Glezer, C.: Database encryption: an overview of contemporary challenges and design considerations. ACM SIGMOD Rec. 38(3), 29–34 (2010)
Dong, X., Li, X.: A novel distributed database solution based on MySQL. In: 7th International Conference on Information Technology in Medicine and Education (ITME), pp. 329–333 (2015)
Basharat, I., Azam, F., Muzaffar, A.W.: Database security and encryption: a survey study. Int. J. Comput. Appl. 47(12), 888–975 (2012)
Sarkar, K.R.: Assessing insider threats to information security using technical, behavioural and organizational measures. Inf. Secur. Tech. Rep. 15, 112–133 (2010)
Kim, T.-Y., Cho, S.B.: Web traffic anomaly detection using C-LSTM neural networks. Expert Syst. Appl. 106, 66–76 (2018)
Chen, C.M., Guan, D.J., Huang, Y.Z., Ou, Y.H.: Anomaly network intrusion detection using hidden Markov model. Int. J. Innovative Comput. Inf. Control (ICIC) 12(2), 569–580 (2016)
Islam, M.S., Kuzu, M., Kantarcioglu, M.: A dynamic approach to detect anomalous queries on relational databases. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 245–252 (2015)
Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)
Puthran, S., Shah, K.: Intrusion detection using improved decision tree algorithm with binary and quad split. In: Mueller, P., Thampi, S.M., Alam Bhuiyan, M.Z., Ko, R., Doss, R., Alcaraz Calero, J.M. (eds.) SSCC 2016. CCIS, vol. 625, pp. 427–438. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2738-3_37
Dias, L.P., Cerqueira, J.J., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: Computer Science and Electronic Engineering (CEEC), pp. 145–150 (2017)
Devikrishna, K.S., Ramakrishna, B.B.: An artificial neural network based intrusion detection system and classification of attacks. Int. J. Eng. Res. Appl. (IJERA) 3(4), 1959–1964 (2013)
Aslahi-Shahri, B.M., et al.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669–1676 (2016)
Ali, M.H., Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255–20261 (2018)
Seo, Y.-G., Cho, S.-B., Yao, X.: The impact of payoff function and local interaction on the N-player iterated prisoner’s dilemma. Knowl. Inf. Syst. 2(4), 461–478 (2000)
Cho, S.-B., Shimohara, K.: Evolutionary learning of modular neural networks with genetic programming. Appl. Intell. 9(3), 191–200 (1998)
Acknowledgement
This work was supported by an Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean government (19ZS1110, Development of self-improving and human augmenting cognitive computing technology).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, TY., Cho, SB. (2019). Particle Swarm Optimization-Based CNN-LSTM Networks for Anomalous Query Access Control in RBAC-Administered Model. In: Pérez García, H., Sánchez González, L., Castejón Limas, M., Quintián Pardo, H., Corchado Rodríguez, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2019. Lecture Notes in Computer Science(), vol 11734. Springer, Cham. https://doi.org/10.1007/978-3-030-29859-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-29859-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29858-6
Online ISBN: 978-3-030-29859-3
eBook Packages: Computer ScienceComputer Science (R0)