Skip to main content
Top

2018 | OriginalPaper | Chapter

Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes an adaptive database intrusion detection model that can be resistant to potential insider misuse with a limited number of data. The intrusion detection model can be adapted online using evolutionary reinforcement learning (ERL) which combines reinforcement learning and evolutionary learning. The model consists of two feedforward neural networks, a behavior network and an evaluation network. The behavior network detects the intrusion, and the evaluation network provides feedback to the detection of the behavior network. To find the optimal model, we encode the weights of the networks as an individual and produce populations of better individuals over generations. TPC-E scenario-based virtual query data were used for verification of the proposed model. Experimental results show that the detection performance improves as the proposed model learns the intrusion adaptively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Kamra, A., Bertino, E., Lebanon, G.: Mechanisms for database intrusion detection and response. In: Proceedings of the 2nd SIGMOD PhD Workshop on Innovative Database Research, pp. 31–36, June 2008 Kamra, A., Bertino, E., Lebanon, G.: Mechanisms for database intrusion detection and response. In: Proceedings of the 2nd SIGMOD PhD Workshop on Innovative Database Research, pp. 31–36, June 2008
4.
go back to reference Bertino, E., Kamra, A., Early, J.P.: Profiling database application to detect SQL injection attacks. In: Performance, Computing, and Communications Conference, pp. 449–458, April 2007 Bertino, E., Kamra, A., Early, J.P.: Profiling database application to detect SQL injection attacks. In: Performance, Computing, and Communications Conference, pp. 449–458, April 2007
5.
go back to reference Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., Dokas, P.: Minds-minnesota intrusion detection system. In: Next Generation Data Mining, pp. 199–218 (2004) Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., Dokas, P.: Minds-minnesota intrusion detection system. In: Next Generation Data Mining, pp. 199–218 (2004)
6.
go back to reference Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM International Conference on Data Mining, pp. 25–36, May 2003 Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM International Conference on Data Mining, pp. 25–36, May 2003
7.
go back to reference Ackley, D., Littman, M.: Interactions between learning and evolution. Artif. Life II 10, 487–509 (1991) Ackley, D., Littman, M.: Interactions between learning and evolution. Artif. Life II 10, 487–509 (1991)
8.
go back to reference Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)CrossRef Ronao, C.A., Cho, S.B.: Anomalous query access detection in RBAC-administered databases with random forest and PCA. Inf. Sci. 369, 238–250 (2016)CrossRef
9.
go back to reference Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection (1994) Kumar, S., Spafford, E.H.: A pattern matching model for misuse intrusion detection (1994)
10.
go back to reference Bertino, E., Terzi, E., Kamra, A., Vakali, A.: Intrusion detection in RBAC-administered databases. In: Computer Security Applications Conference, 21st Annual, pp. 173–182, December 2005 Bertino, E., Terzi, E., Kamra, A., Vakali, A.: Intrusion detection in RBAC-administered databases. In: Computer Security Applications Conference, 21st Annual, pp. 173–182, December 2005
11.
go back to reference Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 123–140, July 2005 Valeur, F., Mutz, D., Vigna, G.: A learning-based approach to the detection of SQL attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 123–140, July 2005
12.
go back to reference Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: International Workshop on Recent Advances in Intrusion Detection, pp. 382–401, September 2010 Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.: A data-centric approach to insider attack detection in database systems. In: International Workshop on Recent Advances in Intrusion Detection, pp. 382–401, September 2010
13.
go back to reference Chagarlamudi, M., Panda, B., Hu, Y.: Insider threat in database systems: preventing malicious users’ activities in databases. In: Information Technology: New Generations, pp. 1616–1620, April 2009 Chagarlamudi, M., Panda, B., Hu, Y.: Insider threat in database systems: preventing malicious users’ activities in databases. In: Information Technology: New Generations, pp. 1616–1620, April 2009
14.
go back to reference Montana, D.J., Davis, L.: Training Feedforward neural networks using genetic algorithms. In: IJCAI 1989, vol. 89, pp. 762–767, August 1989 Montana, D.J., Davis, L.: Training Feedforward neural networks using genetic algorithms. In: IJCAI 1989, vol. 89, pp. 762–767, August 1989
15.
go back to reference Kitano, H.: Designing neural networks using genetic algorithms with graph generation system. Complex Syst. 4(4), 461–476 (1990)MATH Kitano, H.: Designing neural networks using genetic algorithms with graph generation system. Complex Syst. 4(4), 461–476 (1990)MATH
16.
go back to reference Blickle, T., Thiele, L.: A comparison of selection schemes used in evolutionary algorithms. Evol. Comput. 4(4), 361–394 (1996)CrossRef Blickle, T., Thiele, L.: A comparison of selection schemes used in evolutionary algorithms. Evol. Comput. 4(4), 361–394 (1996)CrossRef
17.
go back to reference Syswerda, G.: Uniform crossover in genetic algorthms. In: Proceedings of Third International Conference of Genetic Algorithms, pp. 2–9 (1989) Syswerda, G.: Uniform crossover in genetic algorthms. In: Proceedings of Third International Conference of Genetic Algorithms, pp. 2–9 (1989)
Metadata
Title
Adaptive Database Intrusion Detection Using Evolutionary Reinforcement Learning
Authors
Seul-Gi Choi
Sung-Bae Cho
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-67180-2_53

Premium Partner