Home // ICDS 2015, The Ninth International Conference on Digital Society // View article


A Comparison of Data Mining Techniques for Anomaly Detection in Relational Databases

Authors:
Charissa Ann V. Ronao
Sung-Bae Cho

Keywords: intrusion detection; anomaly detection; database security; data mining; analysis

Abstract:
Data mining has gained a lot of attention in recent years especially with the advent of big data. In line with this, relational database management systems (RDBMS) have also become the ultimate layer in preventing malicious data access. However, despite the presence of traditional database security mechanisms, it is apparent that database intrusions still occur. Thus, there is an imminent need in developing a robust and efficient intrusion detection system (IDS) especially tailored for databases. Among the few studies that have been published with regards to the problem at hand, most researchers have proposed the use of data mining techniques to detect database anomalous behavior. However, up to this date, there has been no work aimed to objectively compare these various data mining techniques as applied to the field of database IDS. In this paper, we evaluate the state-of-the-art feature selection and data mining algorithms in the context of database IDS and provide a clear performance comparison of these techniques under common grounds. Experiments show that principal components analysis produces a reasonably compact and meaningful subset of features while graphical models like decision trees, random forest, and Bayesian networks yield a consistently high performance in detecting anomalies in databases.

Pages: 11 to 16

Copyright: Copyright (c) IARIA, 2015

Publication date: February 22, 2015

Published in: conference

ISSN: 2308-3956

ISBN: 978-1-61208-381-0

Location: Lisbon, Portugal

Dates: from February 22, 2015 to February 27, 2015