Enhancing Security of Databases through Anomaly Detection in Structured Workloads
DOI:
https://doi.org/10.5614/itbj.ict.res.appl.2025.18.3.2Keywords:
anomaly detection, database security, Isolation Forest, machine learning, MySQL, structured workloadsAbstract
In today?s world, the protection of databases in any global organization has become paramount due to the rapid growth of data and the new generations of cyber threats. This highlights the need for more enhanced security precautions to secure these databases containing sensitive information. One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. The present research utilized the Isolation Forest algorithm to detect outliers in high-dimensional data sets. The main contribution and novelty of this research lies in leveraging the Isolation Forest algorithm for structured database workloads to proactively identify and mitigate potential security threats. Our study showed that the proposed model, with an accuracy of 85%, outperformed various state-of-the-art methods. Furthermore, anomaly detection systems powered by advanced algorithms and machine learning enable real-time database activities analysis, addressing challenges like preprocessing, model training and scalability.
Downloads
References
Gba?, D., Y?ld?r?m, T., Genovese, A. & Scotti, F., A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems, IEEE Systems Journal, 15(2), pp. 1717-1731, June 2021.
Paul, P. & Aithal, P.S., Database Security: An Overview and Analysis of Current Trend, International Journal of Management, Technology, and Social Sciences (IJMTS), 4(2), 53-58, 2019
Li, S., Yin, Q., Li, G., Li, Q., Liu, Z. & Zhu, J., Unsupervised Contextual Anomaly Detection for Database Systems. International Conference on Management of Data (SIGMOD '22), Association for Computing Machinery, New York, NY, USA, pp.788-802, June 2022.
Nassif, A.B., Talib, M.A., Nasir Q. & Dakalbab, F.M., Machine Learning for Anomaly Detection: A Systematic Review, in IEEE Access, 9, pp. 78658-78700, 2021.
Xu, H., Pang, G., Wang, Y. & Wang, Y., Deep Isolation Forest for Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 35(12), pp. 1-14, 2023.
Moon, J., Noh, Y., Jung, S., Lee, J., Hwang, E., Anomaly Detection using a Model-agnostic Meta-learning-based Variational Auto-encoder for Facility Management, Journal of Building Engineering, 68, 106099, 2023.
Lakshmi, M.S., Rajavikram, G., Dattatreya, V., Jyothi, B.S., Patil, S. & Bhavsingh, M., Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security, Journal of Electrical Systems, 19(4), pp. 279-297, 2023.
Elsaid, S.A. & Binbusayyis, A., An Optimized Isolation Forest based Intrusion Detection System for Heterogeneous and Streaming Data in the Industrial Internet of Things (IIoT) Networks. Discover Applied Sciences, 6, 483, 2024.
Lu, T., Wang, L. & Zhao, X., Review of Anomaly Detection Algorithms for Data Streams. Applied Sciences. 13, 6353, 2023.
Wang, B., Hua, Q., Zhang, H., Tan, X., Nan, Y., Chen, R. & Shu, X., Research on Anomaly Detection and Real-Time Reliability Evaluation with the Log of Cloud Platform, Alexandria Engineering Journal, 61(9), pp. 7183-7193, 2022.
Naserinia, V. & Beremark, M., Anomaly Detection in a SQL Database: A Retrospective Investigation, Student Thesis of Master's Programme in Network Forensics, Halmstad University, School of Information Technology, 2022.
Chouliaras, S. & Sotiriadis, S., Real-time Anomaly Detection of NoSQL Systems Based on Resource Usage Monitoring, in IEEE Transactions on Industrial Informatics, 16(9), pp. 6042-6049, Sept. 2020.
Roh, J.-h., Lee, S.-H. & Kim, S., Anomaly Detection of Access Patterns in Database, 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp. 1112-1115, 2015
Wang, T., Wei, J., Zhang, W., Zhong, H. & Huang, T., Workload-Aware Anomaly Detection for Web Applications, Journal of Systems and Software, 89, pp.19-32, 2014
Kamra, A., Terzi, E. & Bertino, E., Detecting Anomalous Access Patterns in Relational Databases. The VLDB Journal, 17, pp.1063-1077, 2008.
Akme?e, F. Diagnosing Diabetes with Machine Learning Techniques. Hittite J Sci Eng., 9(1), pp. 9-18, 2022.