@article { author = {Doroudian, M. and Shahriari, H. R.}, title = {A hybrid approach for database intrusion detection at transaction and inter-transaction levels}, journal = {The ISC International Journal of Information Security}, volume = {6}, number = {2}, pages = {155-167}, year = {2014}, publisher = {Iranian Society of Cryptology}, issn = {2008-2045}, eissn = {2008-3076}, doi = {10.22042/isecure.2015.6.2.5}, abstract = {Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks in both database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find dependency and sequence rules. The main advantage of this system, in comparison with the previous database intrusion detection systems, is that it can detect malicious behaviors in both transaction and inter-transaction levels. Also, it gains advantages of a hybrid method, including specification-based detection and anomaly detection, to minimize both false positive and false negative alarms. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experiment results demonstrate that the true positive rate (recall metric) is higher than 80%, and the false positive rate is lower than 10% per different data sets and choosing appropriate ranges for support and confidence thresholds. The experimental evaluation results show high accuracy and effectiveness of the proposed system.}, keywords = {Intrusion Detection,Database Security,State machine,Inter-Transaction Dependency,Inter-Transaction Sequence}, url = {https://www.isecure-journal.com/article_39158.html}, eprint = {https://www.isecure-journal.com/article_39158_f18c739d9aaeae6cc3ee1d085e4c204c.pdf} }