Cited 4 time in
Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:01Z | - |
| dc.date.available | 2024-12-03T02:01:01Z | - |
| dc.date.issued | 2019 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.issn | 1611-3349 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73653 | - |
| dc.description.abstract | A database Intrusion Detection System (IDS) based on Role-based Access Control (RBAC) mechanism that has capability of learning and adaptation learns SQL transaction patterns represented by roles to detect insider attacks. In this paper, we parameterize the rules for partitioning the entire query set into multiple areas with simple chromosomes and propose an ensemble of multiple deep learning models that can effectively model the tree structural characteristics of SQL transactions. Experimental results on a large synthetic query dataset verify that it quantitatively outperforms other ensemble methods and machine learning methods including deep learning models, in terms of 10-fold cross validation and chi-square validation. | - |
| dc.format.extent | 12 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Verlag | - |
| dc.title | Genetic Algorithm-Based Deep Learning Ensemble for Detecting Database Intrusion via Insider Attack | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1007/978-3-030-29859-3_13 | - |
| dc.identifier.scopusid | 2-s2.0-85072896534 | - |
| dc.identifier.wosid | 000561045500013 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.11734, pp 145 - 156 | - |
| dc.citation.title | Lecture Notes in Computer Science | - |
| dc.citation.volume | 11734 | - |
| dc.citation.startPage | 145 | - |
| dc.citation.endPage | 156 | - |
| dc.type.docType | Proceedings Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
| dc.subject.keywordPlus | SQL INJECTION | - |
| dc.subject.keywordAuthor | Deep learning ensemble | - |
| dc.subject.keywordAuthor | Genetic algorithms | - |
| dc.subject.keywordAuthor | Database intrusion detection | - |
| dc.subject.keywordAuthor | Role-based access control | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
