Detailed Information

Cited 5 time in webofscience Cited 6 time in scopus
Metadata Downloads

Insider attack detection in database with deep metric neural network with Monte Carlo sampling

Full metadata record
DC Field Value Language
dc.contributor.authorGo, Gwang-Myong-
dc.contributor.authorBu, Seok-Jun-
dc.contributor.authorCho, Sung-Bae-
dc.date.accessioned2024-12-03T02:01:02Z-
dc.date.available2024-12-03T02:01:02Z-
dc.date.issued2022-12-
dc.identifier.issn1367-0751-
dc.identifier.issn1368-9894-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/73667-
dc.description.abstractRole-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user's queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a deep metric neural network with strategic sampling algorithm that properly extracts salient features and directly learns a quantitative measure of similarity. A strategic sampling method of heuristically generating and learning training pairs through Monte Carlo search is proposed to select a training pair that can represent the entire dataset. With the TPC-E-based benchmark data trained with 11,000 queries for 11 roles, the proposed model produces the classification accuracy of 95.41%, which is the highest compared with the previous models. The results are verified through comparison of quantitative and qualitative evaluations, and the feature space modelled in the neural network is analysed by t-SNE algorithm.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherOxford University Press-
dc.titleInsider attack detection in database with deep metric neural network with Monte Carlo sampling-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1093/jigpal/jzac007-
dc.identifier.scopusid2-s2.0-85142706641-
dc.identifier.wosid000755678100001-
dc.identifier.bibliographicCitationLogic Journal of the IGPL, v.30, no.6, pp 979 - 992-
dc.citation.titleLogic Journal of the IGPL-
dc.citation.volume30-
dc.citation.number6-
dc.citation.startPage979-
dc.citation.endPage992-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalResearchAreaScience & Technology - Other Topics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.relation.journalWebOfScienceCategoryMathematics-
dc.relation.journalWebOfScienceCategoryLogic-
dc.subject.keywordPlusSTRUCTURAL SIMILARITY-
dc.subject.keywordPlusINTRUSION-
dc.subject.keywordAuthorDatabase management system-
dc.subject.keywordAuthorintrusion detection-
dc.subject.keywordAuthorMonte Carlo search-
dc.subject.keywordAuthortriplet network-
dc.subject.keywordAuthormetric learning-
dc.subject.keywordAuthordeep learning-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seok-Jun, Buu photo

Seok-Jun, Buu
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE