Cited 1 time in
Detecting intrusion via insider attack in database transactions by learning disentangled representation with deep metric neural network
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Go, Gwang-Myong | - |
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:03Z | - |
| dc.date.available | 2024-12-03T02:01:03Z | - |
| dc.date.issued | 2021 | - |
| dc.identifier.issn | 2194-5357 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73678 | - |
| dc.description.abstract | Database management systems based on role-based access control are widely used for information storage and analysis, but they are reportedly vulnerable to insider attacks. From the point of adaptive system, it is possible to perform classification on user queries accessing the database to determine insider attacks when they differ from the predicted values. In order to cope with high similarity of user queries, this paper proposes a deep metric neural network with hierarchical structure that extracts the salient features appropriately and learns the quantitative scale of similarity directly. The proposed model trained with 11,000 queries for 11 roles from the benchmark dataset of TPC-E produces the classification accuracy of 94.17%, which is the highest compared to the previous studies. The quantitative performance is evaluated by 10-fold cross-validation, the feature space embedded in the neural network is visualized by t-SNE, and the qualitative analysis is conducted by clustering the compression vectors among classes. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. | - |
| dc.format.extent | 10 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
| dc.title | Detecting intrusion via insider attack in database transactions by learning disentangled representation with deep metric neural network | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1007/978-3-030-57805-3_43 | - |
| dc.identifier.scopusid | 2-s2.0-85091148757 | - |
| dc.identifier.bibliographicCitation | Advances in Intelligent Systems and Computing, v.1267 AISC, pp 460 - 469 | - |
| dc.citation.title | Advances in Intelligent Systems and Computing | - |
| dc.citation.volume | 1267 AISC | - |
| dc.citation.startPage | 460 | - |
| dc.citation.endPage | 469 | - |
| dc.type.docType | Conference paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Convolutional neural network | - |
| dc.subject.keywordAuthor | Database management system | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Intrusion detection | - |
| dc.subject.keywordAuthor | Metric learning | - |
| dc.subject.keywordAuthor | Triplet network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
