Fast detection of database system abuse behaviors based on data mining approach

  • Authors:
  • Yubao Liu;Jiarong Cai;Zhilan Huang;Jingwen Yu;Jian Yin

  • Affiliations:
  • Sun Yat-Sen University, Guangzhou, China;Sun Yat-Sen University, Guangzhou, China;Sun Yat-Sen University, Guangzhou, China;Sun Yat-Sen University, Guangzhou, China;Sun Yat-Sen University, Guangzhou, China

  • Venue:
  • Proceedings of the 2nd international conference on Scalable information systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, the mining of system log datasets has be widely used in the system security application field such as the detection of abuse behaviors. At present, most of efforts concentrate on the network or operating system level. There are few works concentrated on database system application. In this paper, we present the concept of access profile to represent the user behavior characteristics of accessing database system and study the problem of mining maximal access profiles for fast detection of database system insider abuse behaviors by legitimate users. Based on the existing FP-tree structure, a new mining algorithm MMAP is presented for our problem. A new constraint of relation distance, which is based on the foreign key dependencies of relations, is also presented to reduce the mining algorithm search space. An anomaly-based detection model is build based on MMAP algorithm for performance experiments. The experimental results show that our approach works efficiently for detecting the abuse behaviors of database system.