Cited 6 time in
Insider attack detection in database with deep metric neural network with Monte Carlo sampling
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Go, Gwang-Myong | - |
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:02Z | - |
| dc.date.available | 2024-12-03T02:01:02Z | - |
| dc.date.issued | 2022-12 | - |
| dc.identifier.issn | 1367-0751 | - |
| dc.identifier.issn | 1368-9894 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73667 | - |
| dc.description.abstract | Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user's queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a deep metric neural network with strategic sampling algorithm that properly extracts salient features and directly learns a quantitative measure of similarity. A strategic sampling method of heuristically generating and learning training pairs through Monte Carlo search is proposed to select a training pair that can represent the entire dataset. With the TPC-E-based benchmark data trained with 11,000 queries for 11 roles, the proposed model produces the classification accuracy of 95.41%, which is the highest compared with the previous models. The results are verified through comparison of quantitative and qualitative evaluations, and the feature space modelled in the neural network is analysed by t-SNE algorithm. | - |
| dc.format.extent | 14 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Oxford University Press | - |
| dc.title | Insider attack detection in database with deep metric neural network with Monte Carlo sampling | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1093/jigpal/jzac007 | - |
| dc.identifier.scopusid | 2-s2.0-85142706641 | - |
| dc.identifier.wosid | 000755678100001 | - |
| dc.identifier.bibliographicCitation | Logic Journal of the IGPL, v.30, no.6, pp 979 - 992 | - |
| dc.citation.title | Logic Journal of the IGPL | - |
| dc.citation.volume | 30 | - |
| dc.citation.number | 6 | - |
| dc.citation.startPage | 979 | - |
| dc.citation.endPage | 992 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Mathematics | - |
| dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
| dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
| dc.relation.journalWebOfScienceCategory | Mathematics | - |
| dc.relation.journalWebOfScienceCategory | Logic | - |
| dc.subject.keywordPlus | STRUCTURAL SIMILARITY | - |
| dc.subject.keywordPlus | INTRUSION | - |
| dc.subject.keywordAuthor | Database management system | - |
| dc.subject.keywordAuthor | intrusion detection | - |
| dc.subject.keywordAuthor | Monte Carlo search | - |
| dc.subject.keywordAuthor | triplet network | - |
| dc.subject.keywordAuthor | metric learning | - |
| dc.subject.keywordAuthor | deep learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
