2015
DOI: 10.1007/978-3-319-19066-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Mining SQL Queries to Detect Anomalous Database Access using Random Forest and PCA

Abstract: Abstract. Data have become a very important asset to many organizations, companies, and individuals, and thus, the security of relational databases that encapsulate these data has become a major concern. Standard database security mechanisms, as well as network-based and host-based intrusion detection systems, have been rendered inept in detecting malicious attacks directed specifically to databases. Therefore, there is an imminent need in developing an intrusion detection system (IDS) specifically for the dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…[5] used tree kernels to model SQL statements and detect intrusions; although using tree kernels enabled them to exploit the structure of the SQL syntax and proved that this, indeed, has a good effect on performance, the method introduced a huge computational overhead, making anomaly detection drastically slow. We have stressed the importance of timely detection in a previous work [27] and have concluded on candidate algorithms that perform well with large query data sets. Therefore, in this paper, we show the…”
Section: Related Workmentioning
confidence: 98%
“…[5] used tree kernels to model SQL statements and detect intrusions; although using tree kernels enabled them to exploit the structure of the SQL syntax and proved that this, indeed, has a good effect on performance, the method introduced a huge computational overhead, making anomaly detection drastically slow. We have stressed the importance of timely detection in a previous work [27] and have concluded on candidate algorithms that perform well with large query data sets. Therefore, in this paper, we show the…”
Section: Related Workmentioning
confidence: 98%