Abstract
Relational databases contain information that must be protected such as personal information, the problem of intrusion detection of relational database is considered important. Also, the pattern of attacks evolves and it is difficult to grasp by rule-based method or general machine learning, so adaptive learning is needed. Learning classifier systems are system that combines supervised learning, reinforcement learning and evolutionary computation. It creates and updates classifiers according to data input. Learning classifier systems can learn adaptive because they generate and evaluate classifiers in real time. In this paper, we apply accuracy based learning classifier systems to relational database and confirm that adaptive learning is possible. Also, we confirmed their practical usability that they close to the best accuracy, though were not the best.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB J. 17(5), 1063–1077 (2008)
Srivatava, A., Sural, S., Majumdar, A.K.: Database intrusion detection using sequence mining. J. Comput. 1(4), 8–17 (2006)
Rietta, F.S.: Application layer intrusion detection for SQL injection. In: ACM Southeast Regional Conference, pp. 531–536 (2006)
Adebowale, A., Idowu, S.A., Oluwabukola, O.: An overview of database centred intrusion detection systems. Int. J. Eng. Adv. Technol. 3(2), 273–275 (2013)
Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: ACM Symposium on Applied Computing, pp. 711–716 (2004)
Barbara, D., Goel, R., Jajodia, S.: Mining malicious corruption of data with hidden markov models. In: Research Directions in Data and Applications Security. IFIP, vol. 128, pp. 175–189 (2003)
Rajput, I.J., Shrivastava, D.: Data mining based database intrusion detection system: a survey. Int. J. Eng. Res. Appl. (IJERA) 2(4), 1752–1755 (2012)
Ronao, C.A., Cho, S.B.: Mining SQL queries to detect anomalous database access using random forest and PCA. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 151–160 (2015)
Holland, J.H., Reitman, J.S.: Cognitive systems based on adaptive algorithms. ACM Sigart Bull. 63, 49 (1977)
Wilson, S.W.: Classifier fitness based on accuracy. Evol. Comput. 3(2), 149–175 (1995)
Bernado-Mansilla, E., Garrell-Guiu, J.M.: Accuracy-based learning classifier systems: models, analysis and applications to classification tasks. Evol. Comput. 11(3), 209–238 (2003)
Shafi, K., Kovacs, T., Abbass, H.A., Zhu, W.: Intrusion detection with evolutionary learning classifier systems. Nat. Comput. 8(1), 3–27 (2009)
Transaction Processing Performance Council (TPC): TPC benchmark E, Standard specification, Version 1.13.0 (2014)
Acknowledgements
This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract. (UD160066BD).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Lee, C.S., Cho, S.B. (2018). Learning Classifier Systems for Adaptive Learning of Intrusion Detection System. In: Pérez García, H., Alfonso-Cendón, J., Sánchez González, L., Quintián, H., Corchado, E. (eds) International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding. SOCO ICEUTE CISIS 2017 2017 2017. Advances in Intelligent Systems and Computing, vol 649. Springer, Cham. https://doi.org/10.1007/978-3-319-67180-2_54
Download citation
DOI: https://doi.org/10.1007/978-3-319-67180-2_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67179-6
Online ISBN: 978-3-319-67180-2
eBook Packages: EngineeringEngineering (R0)