Enhancing Security of Databases through Anomaly Detection in Structured Workloads

Authors

  • Charanjeet Dadiyala Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,
  • Faijan Qureshi Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,
  • Kritika Anil Bhattad Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,
  • Sourabh Thakur Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,
  • Nida Tabassum Sharif Sheikh Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,
  • Kushagra Anil Kumar Singh Shri Ramdeobaba College of Engineering and Management Nagpur, 440013,

DOI:

https://doi.org/10.5614/itbj.ict.res.appl.2025.18.3.2

Keywords:

anomaly detection, database security, Isolation Forest, machine learning, MySQL, structured workloads

Abstract

In today?s world, the protection of databases in any global organization has become paramount due to the rapid growth of data and the new generations of cyber threats. This highlights the need for more enhanced security precautions to secure these databases containing sensitive information. One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. The present research utilized the Isolation Forest algorithm to detect outliers in high-dimensional data sets. The main contribution and novelty of this research lies in leveraging the Isolation Forest algorithm for structured database workloads to proactively identify and mitigate potential security threats. Our study showed that the proposed model, with an accuracy of 85%, outperformed various state-of-the-art methods. Furthermore, anomaly detection systems powered by advanced algorithms and machine learning enable real-time database activities analysis, addressing challenges like preprocessing, model training and scalability.

Downloads

Download data is not yet available.

References

Gba?, D., Y?ld?r?m, T., Genovese, A. & Scotti, F., A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems, IEEE Systems Journal, 15(2), pp. 1717-1731, June 2021.

Paul, P. & Aithal, P.S., Database Security: An Overview and Analysis of Current Trend, International Journal of Management, Technology, and Social Sciences (IJMTS), 4(2), 53-58, 2019

Li, S., Yin, Q., Li, G., Li, Q., Liu, Z. & Zhu, J., Unsupervised Contextual Anomaly Detection for Database Systems. International Conference on Management of Data (SIGMOD '22), Association for Computing Machinery, New York, NY, USA, pp.788-802, June 2022.

Nassif, A.B., Talib, M.A., Nasir Q. & Dakalbab, F.M., Machine Learning for Anomaly Detection: A Systematic Review, in IEEE Access, 9, pp. 78658-78700, 2021.

Xu, H., Pang, G., Wang, Y. & Wang, Y., Deep Isolation Forest for Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 35(12), pp. 1-14, 2023.

Moon, J., Noh, Y., Jung, S., Lee, J., Hwang, E., Anomaly Detection using a Model-agnostic Meta-learning-based Variational Auto-encoder for Facility Management, Journal of Building Engineering, 68, 106099, 2023.

Lakshmi, M.S., Rajavikram, G., Dattatreya, V., Jyothi, B.S., Patil, S. & Bhavsingh, M., Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security, Journal of Electrical Systems, 19(4), pp. 279-297, 2023.

Elsaid, S.A. & Binbusayyis, A., An Optimized Isolation Forest based Intrusion Detection System for Heterogeneous and Streaming Data in the Industrial Internet of Things (IIoT) Networks. Discover Applied Sciences, 6, 483, 2024.

Lu, T., Wang, L. & Zhao, X., Review of Anomaly Detection Algorithms for Data Streams. Applied Sciences. 13, 6353, 2023.

Wang, B., Hua, Q., Zhang, H., Tan, X., Nan, Y., Chen, R. & Shu, X., Research on Anomaly Detection and Real-Time Reliability Evaluation with the Log of Cloud Platform, Alexandria Engineering Journal, 61(9), pp. 7183-7193, 2022.

Naserinia, V. & Beremark, M., Anomaly Detection in a SQL Database: A Retrospective Investigation, Student Thesis of Master's Programme in Network Forensics, Halmstad University, School of Information Technology, 2022.

Chouliaras, S. & Sotiriadis, S., Real-time Anomaly Detection of NoSQL Systems Based on Resource Usage Monitoring, in IEEE Transactions on Industrial Informatics, 16(9), pp. 6042-6049, Sept. 2020.

Roh, J.-h., Lee, S.-H. & Kim, S., Anomaly Detection of Access Patterns in Database, 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp. 1112-1115, 2015

Wang, T., Wei, J., Zhang, W., Zhong, H. & Huang, T., Workload-Aware Anomaly Detection for Web Applications, Journal of Systems and Software, 89, pp.19-32, 2014

Kamra, A., Terzi, E. & Bertino, E., Detecting Anomalous Access Patterns in Relational Databases. The VLDB Journal, 17, pp.1063-1077, 2008.

Akme?e, F. Diagnosing Diabetes with Machine Learning Techniques. Hittite J Sci Eng., 9(1), pp. 9-18, 2022.

Downloads

Published

2025-02-28

How to Cite

Dadiyala, C., Qureshi, F. ., Bhattad, K. A., Thakur, S., Sheikh , N. T. S., & Singh, K. A. K. (2025). Enhancing Security of Databases through Anomaly Detection in Structured Workloads . Journal of ICT Research and Applications, 18(3), 196-214. https://doi.org/10.5614/itbj.ict.res.appl.2025.18.3.2

Issue

Section

Articles